Did Apple Buy Topsy for an Edge over Google

January 7, 2016

A couple years ago, Apple bought Topsy Labs, a social analytics firm and Twitter partner out of San Francisco. Now, in “Apple Inc. Acquired Topsy to Beat Google Search Capabilities,” BidnessEtc reports on revelations from Topsy’s former director of business development, Aaron Hayes-Roth. Writer Martin Blanc reveals:

“The startup’s tools were considered to be fast and reliable by the customers who used them. The in-depth analysis was smart enough to go back to 2006 and provide users with analytics and data for future forecasts. Mr. Roth and his team always had a curiosity attached to how Apple would use Twitter in its ecosystem. Apple does not make use of Twitter that much; the account was made in 2011 and there aren’t many tweets that come out of the social network. However, Mr. Roth explains that it was not Twitter data that Apple had its eye on; it was the technology that powered it. The architecture of Topsy makes it easier for systems to search large amounts of data extremely fast with impressive indexing capabilities. Subsequently, Apple’s ecosystem has developed quite a lot since Siri was first introduced with the iPhone 4s. The digital assistant and the Spotlight search are testament to how far Apple’s search capabilities have come.”

The article goes on to illustrate some of those advances, then points out the ongoing rivalry between Apple and Google. Are these improvements the result of Topsy’s tech? And will they give Apple the edge they need over their adversary? Stay tuned.

 

Cynthia Murrell, January 7, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

IBM and Yahoo Hard at Work on Real-Time Data Handling

January 7, 2016

The article titled What You Missed in Big Data: Real-time Intelligence on SiliconAngle speaks to the difficulties of handling the ever-increasing volumes of real-time data for corporations. Recently, IBM created supplementary stream process services including a machine learning engine that comes equipped with algorithm building capabilities. The algorithms aid in choosing relevant information from the numerous connected devices of a single business. The article explains,

“An electronics manufacturer, for instance, could use the service to immediately detect when a sensor embedded in an expensive piece of equipment signals a malfunction and automatically alert the nearest technician. IBM is touting the functionality as a way to cut through the massive volume of machine-generated signals produced every second in such environments, which can overburden not only analysts but also the technology infrastructure that supports their work.”

Yahoo has been working on just that issue, and lately open-sourced its engineers’ answer. In a demonstration to the press, the technology proved able to power through 100 million vales in under three seconds. Typically, such a high number would require two and a half minutes. The target of this sort of technology is measuring extreme numbers like visitor statistics. Accuracy takes a back seat to speed through estimation, but at such a speed it’s worth the sacrifice.

Chelsea Kerwin, January 7, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Magnetic Forensics Partners with In-Q-Tel to Battle Rising Cyber Crimes

January 6, 2016

The article on GCN titled In-Q-Tel Invests in Digital Forensics Firm discusses the recent addition of Magnetic Forensics to the In-Q-Tel investment portfolio. Digital forensics software is making large strides to improve the safety and security of data in a time when hackers seem unstoppable, and this is the area Magnetic Forensics’ applies expertise and innovation. In-Q-Tel is a technology investment firm that supports and coordinates with the CIA and Intelligence Community. The article explains,

Magnetic Forensics’ flagship product, Internet Evidence Finder, recovers unstructured data — such as social media, chat messages and e-mail from computers, smartphones and tablets — and structures the data for analysis and collaboration. It has been used by 2,700 public safety organizations in 92 counties to investigate cases related to cybercrime, terrorism, child exploitation and insider threats.

Given the almost daily reminders of the vulnerability of our data, investment in this sort of software is timely. Magnetic Forensics’ CEO Adam Belsher explained that IEF works by opening the pipeline of investigator workflow, organizing backlogs, and urgently absorbing the facts of the case to ensure a comprehensive understanding of the issue at hand. Additionally, the partnership will enhance In-Q-Tel’s existing product line while allowing for the creation of new resources for cyber security.

Chelsea Kerwin, January 6, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

How Big Data Is Missing the Mark

January 5, 2016

At this point in the Big Data sensation, many businesses are swimming in data without the means to leverage it effectively. TechWeek Europe cites a recent survey from storage provider Pure Storage in its write-up, “Big Data ‘Fails Businesses’ Due to Access, Skills Shortage.” Interestingly, most of the problems seem to have more to do with human procedures and short-sightedness than any technical shortcomings. Writer Tom Jowitt lists the three top obstacles as a lack of skilled workers, limited access to information, and bureaucracy. He tells us:

“So what exactly is going wrong with Big Data to be causing such problems? Well over half (56 percent) of respondents said bureaucratic red tape was the most serious obstacle for business productivity. ‘Bureaucratic red tape around access to information is preventing companies from using their data to find those unique pieces of insight that lead to great ideas,’ said [Pure Storage’s James] Petter. ‘Data ownership is no longer just the remit of the CIO, the democratisation of insight across businesses enables them to disrupt the competition.’ But regulations are also causing worry, with one in ten of the companies citing data protection concerns as holding up their dissemination of information and data throughout their business. The upcoming EU General Data Protection Regulation will soon affect every single company that stores data.”

The survey reports that missed opportunities have cost businesses billions of pounds per year, and almost three-quarters of respondents say their organizations collect data that is just collecting dust. Both cost and time are reasons that information remains unprocessed. On the other hand, Jowitt points to another survey by CA Technologies; most of its respondents expect the situation to improve, and for their data collections to bring profits down the road. Let us hope they are correct.

 

Cynthia Murrell, January 5, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Scientific Research Has Turned into a Safe Space

December 31, 2015

The Internet is a cold, cruel place, especially if you hang out in the comments section on YouTube, eBay forums, social media, and 4chan.  If you practice restraint and limit your social media circles to trusted individuals, you can surf the Internet without encountering trolls and haters.  Some people do not practice common sense, so they encounter many hateful situations on the Internet and as a result they demand “safe spaces.”  Safe spaces are where people do not encounter anything negative.

Safe spaces are stupid.  Period.  What is disappointing is that the “safe space” and “only positive things” has made its way into the scientific community according to Nature in the article, “‘Novel, Amazing, Innovative’: Positive Words On The Rise In Science Papers.”

The University Medical Center in the Netherlands studied the use of positive and negative words in the titles of scientific papers and abstracts from 1974-2014 published on the medical database PubMed.  The researchers discovered that positive words in titles grew from 2% in 1974 to 17.5% in 2014.  Negative word usage increased from 1.3% to 2.4%, while neutral words did not see any change.  The trend only applies to research papers, as the same test was run using published books and it showed little change.

“The most obvious interpretation of the results is that they reflect an increase in hype and exaggeration, rather than a real improvement in the incidence or quality of discoveries… The findings “fit our own observations that in order to get published, you need to emphasize what is special and unique about your study,” he says. Researchers may be tempted to make their findings stand out from thousands of others — a tendency that might also explain the more modest rise in usage of negative words.”

While there is some doubt associated with the findings, because it was only applied to PubMed.  The original research team thinks that it points to much larger problem, because not all research can be “innovative” or “novel.”  The positive word over usage is polluting the social, psychological, and biomedical sciences.

Under the table, this really points to how scientists and researchers are fighting for tenure.  What would this mean for search engine optimization if all searches and descriptions had to have a smile?  Will they even invent a safe space filter?

Whitney Grace, December 31, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

 

Overhyped Science Stuff

December 30, 2015

After Christmas, comes New Year’s Eve and news outlets take the time to reflect on the changes in the past year.  Usually they focus on celebrities who died, headlining news stories, technology advancements, and new scientific discoveries.  One of the geeky news outlets on the Internet is Gizmodo  and they took their shot at highlighting things that happened in 2015, but rather than focusing on new advances they check off “The Most Overhyped Scientific Discoveries In 2015.”

There was extreme hype about an alien megastructure in outer space that Neil deGrasse Tyson had to address and tell folks they were overreacting.  Bacon and other processed meats were labeled as carcinogens and caused cancer!  The media, of course, took the bacon link and ran with it causing extreme panic, but in the long run everything causes cancer from cellphones to sugar.

Global warming is a hot topic that always draws arguments and it appears to be getting worse the more humans release carbon dioxide into the atmosphere.  Humans are always ready for a quick solution and a little ice age would rescue Earth.  It would be brought on by diminishing solar activity, but it turns out carbon dioxide pollution does more damage than solar viability can fix.  Another story involved the nearly indestructible tardigrades and the possibility of horizontal gene transfer, but a dispute between two rival labs about research on tardigrades ruined further research to understanding the unique creature.

The biggest overblown scientific discovery, in our opinion, is NASA’s warp drive.  Humans are desperate for breakthroughs in space travel, so we can blast off to Titan’s beaches for a day and then come home within our normal Earth time.  NASA experimented with an EM Drive:

“Apparently, the engineers working on the EM Drive decided to address some of the skeptic’s concerns head-on this year, by re-running their experiments in a closed vacuum to ensure the thrust they were measuring wasn’t caused by environmental noise. And it so happens, new EM Drive tests in noise-free conditions failed to falsify the original results. That is, the researchers had apparently produced a minuscule amount of thrust without any propellant.

Once again, media reports made it sound like NASA was on the brink of unveiling an intergalactic transport system.”

NASA might be working on warp drive prototype, but the science is based on short-term experiments, none of it has been peer reviewed, and NASA has not claimed that the engine even works.

The media takes the idea snippets and transforms them into overblown news pieces that are based more on junk science than real scientific investigation.

 

Whitney Grace, December 30, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

New and Improved Hacker Methods in China

December 30, 2015

We learn from an article at Yahoo News that, “On China’s Fringes, Cyber Spies Raise Their Game.” Reporters Clare Baldwin, James Pomfret, and Jeremy Wagstaff report that hackers backed by China are using some unique methods, according to Western security experts. Search is but a tiny part of this approach but, perhaps not surprisingly, cloud storage is a factor. The article relates:

“Hackers have expanded their attacks to parking malware on popular file-sharing services including Dropbox and Google Drive to trap victims into downloading infected files and compromising sensitive information. They also use more sophisticated tactics, honing in on specific targets through so-called ‘white lists’ that only infect certain visitors to compromised websites. Security experts say such techniques are only used by sophisticated hackers from China and Russia, usually for surveillance and information extraction. The level of hacking is a sign, they say, of how important China views Hong Kong, where 79 days of protests late last year brought parts of the territory, a major regional financial hub, to a standstill. The scale of the protests raised concerns in Beijing about political unrest on China’s periphery. ‘We’re the most co-ordinated opposition group on Chinese soil, (and) have a reasonable assumption that Beijing is behind the hacking,’ said Lam Cheuk-ting, chief executive of Hong Kong’s Democratic Party, which says it has been a victim of cyber attacks on its website and some members’ email accounts.”

Officially, China’s Defense Ministry denies any connection to the attacks, but that is nothing new. The adaptation of new hacking techniques is part of a continuing cycle; as journalists, scholars, and activists improve their security, hackers adapt. See the article for specifics on some attacks attributed to China-backed hackers, as well as some ways activists are trying to stay ahead.

Cynthia Murrell, December 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

DuckDuckGo Grows in 2015

December 30, 2015

Do you not love it when the little guy is able to compete with corporate giants?  When it comes to search engines DuckDuckGo is the little guy, because unlike big search engines like Google and Yahoo it refuses to track its users browsing history and have targeted ads.  According to Quartz, “DuckDuckGo, The Search Engine That Doesn’t Track Its Users, Grew More Than 70% This Year.”  Through December 15, 2015, DuckDuckGo received 3.25 billion queries up from twelve million queries received during the same time period in 2014.  DuckDuckGo, however, still has trouble cracking the mainstream..

Google is still the biggest search engine in the United States with more than one hundred million monthly searches, but DuckDuckGo only reached 325 million monthly searches in November 2015.  The private search engine also has three million direct queries via desktop computers, but it did not share how many people used DuckDuckGo via a mobile device to protect its users’ privacy.  Google, on the other hand, is happy to share its statistics as more than half of its searches come from mobile devices.

“What’s driving growth? DuckDuckGo CEO Gabriel Weinberg, reached via email, credits partnerships launched in 2014 with Apple and Mozilla, and word of mouth.  He also passes along a Pew study from earlier this year, where 40% of American respondents said they thought search engines ‘shouldn’t retain information about their activity.’… ‘Our biggest challenge is that most people have not heard of us,’ Weinberg says. ‘We very much want to break out into the mainstream.’”

DuckDuckGo offers an unparalleled service for searching.  Weinberg stated the problem correctly that DuckDuckGo needs to break into the mainstream.  Its current user base consists of technology geeks and those in “the know,” some might call them hipsters.  If DuckDuckGo can afford it, how about an advertising campaign launched on Google Ads?

Whitney Grace, December 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Marketing Analytics Holds Many Surprises

December 29, 2015

What I find interesting is how data analysts, software developers, and other big data pushers are always saying things like “hidden insights await in data” or “your business will turn around with analytics.”  These people make it seem like it is big thing, when it is really the only logical outcome that could entail from employing new data analytics.  Marketing Land continues with this idea in the article, “Intentional Serendipity: How Marketing Analytics Trigger Curiosity Algorithms And Surprise Discoveries.”

Serendipitous actions take place at random and cannot be predicted, but the article proclaims with the greater amount of data available to marketers that serendipitous outcomes can be optimized.   Data shows interesting trends, including surprises that make sense but were never considered before the data brought them to our attention.

“Finding these kinds of data surprises requires a lot of sophisticated natural language processing and complex data science. And that data science becomes most useful when the patterns and possibilities they reveal incorporate the thinking of human beings, who contribute the two most important algorithms in the entire marketing analytics framework — the curiosity algorithm and the intuition algorithm.”

The curiosity algorithm is the simple process of triggering a person’s curious reflex, then the person can discern what patterns can lead to a meaningful discovery.  The intuition algorithm is basically trusting your gut and having the data to back up your faith.  Together these make explanatory analytics help people change outcomes based on data.

It follows up with a step-by-step plan about how to organize your approach to explanatory analytics, which is a basic business plan but it is helpful to get the process rolling.  In short, read your data and see if something new pops up.

Whitney Grace, December 29, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Searching Google Drive Is Easier than Ever

December 29, 2015

Google search is supposed to be the most reliable and accurate search, so by proxy Google Drive should be easy to search as well, right?  Wrong!  Google Drive is like a cartoon black hole.  It has an undisclosed amount of space and things easily get lost in it.  Fear not, Google Drive users for Tech Republic has posted a nifty guide on how to use Google Drive’s search and locate your lost spreadsheets and documents: “Pro Tip: How To Use Google Drive’s New And Improved Search.”

Google drive can now be searched with more options: owner, keywords. Item name, shared with, date modified, file type, and located in.  The article explains the quickest way to search Google Drive is with the standard wildcard.  It is the search filter where you add an asterisk to any of the listed search types and viola, the search results list all viable options.  The second method is described as the most powerful option, because it is brand new advanced search feature.  By clicking on the drop down arrow box in the search box, you can access filters to limit or expand your search results.

“For anyone who depends upon Google Drive to store and manage their data, the new search tool will be a major plus. No longer will you have to dig through a vast array of search results to find what you’re looking for. Narrow the field down with the new Drive search box.”

The new search features are pretty neat, albeit standard for most databases.  Why did it take Google so long to deploy them in the first place?

Whitney Grace, December 29, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta