HP Management on Deal Making

November 2, 2015

I love it when management wizards makes comments about management—at other companies. Navigate to “HP Enterprise’s Whitman Pans Dell’s EMC Purchase over Debt.” When you read this comment from HP’s top dog, keep in mind that HP bought DEC and Compaq and flubbed the revenue. Then HP bought Autonomy and wrote off $8 billion of the purchase price.

Here goes:

But, the reality is that we are two years ahead of the game and it will be difficult for others to catch up. First, let me give a little context. To pay back the interest on the $50 billion of debt that the new combined company will have on their balance sheet, Dell will need to pay roughly $2.5 billion a year in interest alone. That’s $2.5 billion that they will allocate away from R&D and other business critical activities, which will keep them from better serving their customers.

In case HP has forgotten, Amazon seems to be doing okay in the cloud market. What is the cost of the Autonomy acquisition? Hmm.

That’s HP.

Stephen E Arnold, November 2, 2015

Neglect Exposes Private Medical Files

October 28, 2015

Data such as financial information and medical files are supposed to be protected behind secure firewalls and barriers that ensure people’s information does not fall into the wrong hands.  While digital security is at the best it has ever been, sometimes a hacker does not to rely on his/her skills to get sensitive information.  Sometimes all they need to do is wait for an idiotic mistake, such as what happened on Amazon Web Services wrote Gizmodo in “Error Exposes 1.5 Million People’s Private Records On Amazon Web Services.”

Tech junkie Chris Vickery heard a rumor that “strange data dumps” could appear on Amazon Web Services, so he decided to go looking for some.  He hunted through AWS, found one such dump, and it was a huge haul or it would have been if Vickery was a hacker.  Vickery discovered it was medical information belonging to 1.5 million people and from these organizations: Kansas’ State Self Insurance Fund, CSAC Excess Insurance Authority, and the Salt Lake County Database.

“The data came from Systema Software, a small company that manages insurance claims. It still isn’t clear how the data ended up on the site, but the company did confirm to Vickery that it happened.  Shortly after Vickery made contact with the affected organizations, the database disappeared from the Amazon subdomain.”

The 1.5 million people should be thanking Vickery, because he alerted these organizations and the data was immediately removed from the Amazon cloud.  It turns out that Vickery was the only one to access the data, but it begs the question what would happen if a malicious hacker had gotten hold of the data?  You can count on that the medical information would have been sold to the highest bidder.

Vickery’s discovery is not isolated.  Other organizations are bound to be negligent in data and your personal information could be posted in an unsecure area.  How can you get organizations to better protect your information?  Good question.

Whitney Grace, October 28, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Vodafone Improves Search Management

October 20, 2015

More than 8,000 call center agents use Vodafone’s internal knowledge management platform dubbed AskVodafone to access client information.  AskVodafone’s old system was not performing as well as it used, so the company decided to upgrade to ExorbyteMotor Traffic runs down Vodafone’s upgrade process in the article, “Exorbyte Matchmaker Managed Over 2 million Searches A Month On The Platform AskVodafone.”

Vodafone wanted to shorten an agent’s processing time on phone calls.  The solution required faceted search, keyword suggestions, more accurate search results, and information related to a caller’s issue.  Exorbyte created an individualized solution for Vodafone and they were given the job:

“Through the experience with the Exorbyte solutions and, of course, the existing site license used in the company the contract has been awarded directly to Exorbyte. These Andreas Vieth, Product Manager Search: ‘Due to the long and successful collaboration with Exorbyte it was logical for us to continue with them in the modernization of AskVodafone portal and to develop synergies between these and the Exorbyte search on the Vodafone website.’”

The solution indexes over 25,000 Web sites and it has increased the center’s data quality and results relevancy.  The end result is that over 8,000 calls and 50,000 searches performed on AskVodafone are resolved faster and with better information.

Whitney Grace, October 20, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Lexmark, a Printer Supply Company, Receives Hold Rating from Analysts

October 20, 2015

The article on Dakota Financial News titled Lexmark International Given Average Recommendation of “Hold” by Brokerages (NYSE: LXK) piles on the bad news for Lexmark, a company best known for its printer supply services. It is a tough time to be in the printing business, and Lexmark has received numerous analyst ratings of “Hold” and “Sell.” The article details the trend,

“Lexmark International (NYSE:LXK) traded down 0.59% during trading on Wednesday, hitting $28.59. The company had a trading volume of 259,296 shares. Lexmark International has a one year low of $27.22 and a one year high of $47.69. The stock has a 50-day moving average of $30.27 and a 200 day moving average of $39.70. The company’s market capitalization is $1.76 billion…The company reported $0.97 earnings per share (EPS) for the quarter, beating analysts’ consensus estimates of $0.85 by $0.12. “

Certainly not a vote of confidence in Lexmark, which owns both Brainware and ISYS Search Software. The article goes into some detail about the companies other work beyond printer supplies including enterprise content and process management software and healthcare archive with integration abilities for unstructured patient information. Perhaps these extras are saving the company from falling entirely into the “sell” category and maintaining at “Hold.”

Chelsea Kerwin, October 20, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Coveo Touts Secure, Intelligent Cloud Search

October 19, 2015

Security is a perpetual concern, especially for those who work in the cloud. Enterprise search firm Coveo want us to know they take security very seriously. Their press release, “Coveo Completes Security Evaluation for cloud-Based Intelligent Search Offerings,” is posted at MarketWatch. The question is, “What does secure mean?” The definition may depend on one’s knowledge of the exploit world.

The write-up states:

“Marking its commitment to be the most secure intelligent search provider in the marketplace, Coveo announced that it has completed a comprehensive evaluation of data security and compliance procedures and processes. Coveo engaged with Brightline CPAs & Associates, which conducted a series of tests to evaluate the effectiveness of operations and controls that address data integrity and security. With data security threats on the rise across various industries and around the world, Coveo recognizes how important it is to provide clients of its cloud, intelligent search offerings with the highest security standards. Over the years, Coveo has implemented a set of industry-standard operations, infrastructure and services to ensure the integrity and privacy of customer data, including:

—  SOC II and SOC I examinations

—  Strong logical and physical access controls

—  Systematic application and source code scanning

—  Comprehensive background checks on all employees

—  24/7/365 live, dedicated operations and security teams

—  Formal, ongoing 3rd party compliance and security reviews”

We are reminded that Coveo was recently named “most innovative leader” for the second year running in the Gartner Enterprise Search Magic Quadrant, with that report lauding the company’s “unusually rich security functions.” Founded in 2005, Coveo maintains offices in the U.S. (SanMateo, CA), the Netherlands, and Quebec.

Cynthia Murrell, October 19, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Web Site Search Goes Camping

October 12, 2015

It is a common fact that if you are a major retailer and your Web site’s search function is horrible, you are losing millions of dollars in sales.  Cabela’s is the world’s largest marketer of hunting, fishing, camping, and other outdoor merchandise decided to upgrade their Web site with GroupBy says PR Newswire in the press release, “Cabela’s And GroupBy Partner To Improve Site Search.”

With GroupBy’s advice, Cabela’s has made a good choice:

“After careful evaluation, Cabela’s selected Searchandiser to replace their Oracle Endeca site search, as they required a robust solution that would deliver accurate search results and an improved user experience for their customers. ‘At Cabela’s we strive to continually improve our customer experience and search relevance is an opportunity area we have identified,’ said Scott Johnstone, Cabela’s Technology Partner Relationship Manager.  ‘To that end, we are partnering with GroupBy Inc. to leverage their merchandising tools, search expertise and the underlying technology.’”

As Cabela’s market expands, with Searchandiser creates a better online shopping experience for users with more secure transactions.  Any outdoor enthusiast with tell you that equipment is vital for a good adventure.   As more people are heading outside to experience the great outdoors, they rely on a decent Web site to order their supplies and gear.  Cabela’s is set to meet the new surge with better searching functionalities.

Whitney Grace, October 12, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Business Intelligence and Data Science: There Is a Difference

October 6, 2015

An article at the SmartDataCollective, “The Difference Between Business Intelligence and Real Data Science,” aims to help companies avoid a common pitfall. Writer Brigg Patton explains:

“To gain a competitive business advantage, companies have started combining and transforming data, which forms part of the real data science. At the same time, they are also carrying out Business Intelligence (BI) activities, such as creating charts, reports or graphs and using the data. Although there are great differences between the two sets of activities, they are equally important and complement each other well.

“For executing the BI functions and data science activities, most companies have professionally dedicated BI analysts as well as data scientists. However, it is here that companies often confuse the two without realizing that these two roles require different expertise. It is unfair to expect a BI analyst to be able to make accurate forecasts for the business. It could even spell disaster for any business. By studying the major differences between BI and real data science, you can choose the right candidate for the right tasks in your enterprise.”

So fund both, gentle reader. Patton distinguishes each position’s area of focus, the different ways they use and look at data, and  their sources, migration needs, and job processes. If need to hire someone to perform these jobs, check out this handy clarification before you write up those job descriptions.

Cynthia Murrell, October 6, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

HP and Its Glorious DEC and Compaq Past

October 1, 2015

Gentle reader, I know you remember that beloved Alta Vista once was a Hewlett Packard property. Ah, what might have been.

I though about HP’s muffed bunnies when I read “Carly Fiorina’s Legacy as CEO of Hewlett Packard.” The write up summarizes an academic approach to figuring out what happened at HP before Carly Fiorina was replaced by Mark Hurd was replaced by Leo Apotheker was replaced by Meg Whitman.

What type of manager was Ms. Fiorina? Here’s the objective assessment in the article:

When Fiorina came to HP, the culture that she walked into was very much “aim, aim, aim and fire” — a slow culture, during a time when companies were moving very fast. In that context, she was what we want our change leaders to be — bold and disruptive. One of her moves was to buy Compaq, which had a fast moving “Internet” culture — “aim, fire, fire, re-aim, fire.”

I assume that approach contributed to the slow, steady decline of the Alta Vista search system.

Who benefited from HP’s handling of Alta Vista? I would suggest the Alphabet Google thing.

Stephen E Arnold, October 1, 2015

The Many Applications of Predictive Analytics

September 29, 2015

The article on Computer World titled Technology that Predicts Your Next Security Fail confers the current explosion in predictive analytics, the application of past occurrences to predict future occurrences. The article cites the example of the Kentucky Department of Revenue (DOR), which used predictive analytics to catch fraud. By providing SAS with six years of data the DOR received a batch of new insights into fraud indicators such as similar filings from the same IP address. The article imparts words of wisdom from SANS Institute instructor Phil Hagen,

“Even the most sophisticated predictive analytics software requires human talent, though. For instance, once the Kentucky DOR tools (either the existing checklist or the SAS tool) suspect fraud, the tax return is forwarded to a human examiner for review. “Predictive analytics is only as good as the forethought you put into it and the questions you ask of it,” Hagen warns….  Also It’s imperative that data scientists, not security teams, drive the predictive analytics project.”

In addition to helping the IRS avoid major fails like the 2013 fraudulent refunds totaling $5.8 billion, predictive analytics has other applications. Perhaps most interesting is its use protecting human assets in regions where kidnappings are common by detecting unrest and alerting organizations to lock up their doors. But it is hard to see limitations for technology that so accurately reads the future.

Chelsea Kerwin, September 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

NTENT Has a New CEO

September 29, 2015

NTENT is a leading natural language processing and semantic search company, that owns the Convera technology, and according to Business Wire Dan Stickel was hired as the new CEO, says “NTENT Appoints Dan Stickel As New CEO.”  NTENT is focused on expanding the company with AltaVista and Google.  Using Stickel’s experience, NTENT has big plans and is sure that Stickel will lead the company to success.

“CEO, Stickel’s first objective will be to prioritize NTENT’s planned expansion along geographic, market and technology dimensions. ‘After spending significant time with NTENT’s Board, management team and front-line employees, I’m excited by the company’s opportunities and by the foundation that’s already been laid in both traditional web and newer mobile capabilities. NTENT has clearly built some world-class technology, and is now scaling that out with customers and partners.’”

In his past positions as CEO at Metaforic and Webtrends s well as head of the enterprise business at AltaVista and software business at Macrovision, Stickel has transitioned companies to become the leaders in their respective industries.

The demand for natural language processing software and incorporating it into semantic search is one of the biggest IT trends at the moment.  The field is demanding innovation and NTENT believes Stickel will guide them.

Whitney Grace, September 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta