Amazon Embodies Modern Management: Efficient, Effective, Encouraging

January 16, 2025

Hopping Dino_thumb_thumb_thumbA dinobaby-crafted post. I confess. I used smart software to create the heart wrenching scene of a farmer facing a tough 2025.

I don’t know if this write up is spot on, but I loved it. Navigate to “Amazon Worker – Struck and Shot in New Orleans Terror Attack – Initially Denied Time Off.” If the link is dead, complain to MSFT, please. (Perhaps the headline tells the tale?) The article pointed out:

Alexis Scott-Windham was celebrating the New Year with friends on Bourbon Street when a pickup truck mounted the sidewalk and rammed a crowd shortly after 3 am local time. She was treated in hospital after the back of her right foot was run over by the vehicle, and she was also shot in the foot. The bullet remains in her limb while doctors work out the best course of action to remove it while she recovers at home. The regional Times-Picayune newspaper interviewed Scott-Windham, who revealed she had been denied medical leave by the Amazon warehouse where she works for a medical checkup in two weeks’ time. The mother feared if she was absent from work for that appointment, she would lose her job.

Several observations are warranted:

  1. Struck means that the vehicle hit her. That would probably test the situational awareness of a Delta Force operator walking with pals to the Green Beans.
  2. Shot. Now when a person is shot, there is the wound itself. However, the shock and subsequent pain are to some annoying. I knew a person who flinched each time a sharp sound interrupted a conversation. That individual, who received a military award for bravery, told me, “Just a reflex.” Sure. Reflex. Hard wired decades after the incident in the Vietnam “conflict.”
  3. Fear of being fired for injuries incurred in a terrorist incident. That’s a nifty way to motivate employees to do their best and trust an organization.

Herewith, the dinobaby award for outstanding management goes to the real or virtual individual who informed the person injured in the terrorist attack the Outstanding Management insignia. Wear it proudly. When terminating people, the insignia is known to blink in Morse code, “Amazon is wonderful.”

image

Stephen E Arnold, January 16, 2025

How To: Create Junk Online Content with AI

January 16, 2025

animated-dinosaur-image-0055_thumbA dinobaby produced this post. Sorry. No smart software was able to help the 80 year old this time around.

Why sign up for a Telegram SEO expert in Myanmar or the Philippines? You can do it yourself. An explainer called “AI Marketing Strategy: How to Use AI for Marketing (Examples & Tools)” provides the recipe. The upside? Well, I am not sure. The downside? More baloney with which to dupe smart software and dumb humans.

What does the free write up cover? Here’s the list of topics. Which whet your appetite for AI-generated baloney?

  • A definition of AI marketing
  • How to use AI in your strategy for cutting corners and whacking out “real” information
  • The steps you have to follow to find the pot of gold
  • The benefits of being really smart with smart software
  • The three — count them — types of smart software marketing
  • The three — count them — “best” AI marketing software (I love “best”. So credible)
  • A smart software FAQ
  • How to “future proof” your business with an AI marketing strategy.

Let me give you an example of the riches tucked inside this EWeek “real” news article. The write up says:

Maintain data quality

Okay, marketers are among the world’s leaders in data accuracy, thoroughness, and detail fact checking. That’s why the handful of giant outfits providing smart software explain how to keep cheese on pizza with glue and hallucinate.

Why should one use smart software to market? That’s easy. The answer is that smart software makes it easy to produce output which may be incorrect. If you want more benefits, here’s the graphic from the write up which explains it to short-cutters who don’t want to spend time doing work the old-fashioned way:

Screenshot 2025-01-11 075459

A graphic which may or may not have been produced with smart software designed to create “McKinsey” type illustrations suitable for executives with imposter syndrome.

This graphic is followed by an explanation of the three — count them — three types of AI marketing. I am not sure the items listed are marketing, but, hey, when one is doing a deep dive one doesn’t linger too long deep in the content ocean with concepts like machine learning, natural language processing, and computer vision. (I am not joking. These are the three types of AI marketing. Who knew? Certainly not this dinobaby.

The author, according to the definitive write up, possesses “more than 10 years of experience covering technology, software, and news.” The home base for this professional is the Philippines, which along with Thailand and Cambodia, one of the hot beds for a wide range of activities, including the use of smart software to generate those SEO services publicized on Telegram.

Was the eWeek article written with the help of AI? Boy, this dinobaby doesn’t know.

Stephen E Arnold, January 16, 2025

Can the UN Control the Intelligence Units of Countries? Yeah, Sure. No Problem

January 16, 2025

dino orange_thumbThis blog post is the work of an authentic dinobaby. Sorry. No smart software can help this reptilian thinker.

I assume that the information in “Governments Call for Spyware Regulations in UN Security Council Meeting” is spot on or very close to the bull’s eye. The write up reports:

On Tuesday [January 14, 2025] , the United Nations Security Council held a meeting to discuss the dangers of commercial spyware, which marks the first time this type of software — also known as government or mercenary spyware — has been discussed at the Security Council.  The goal of the meeting, according to the U.S. Mission to the UN, was to “address the implications of the proliferation and misuse of commercial spyware for the maintenance of international peace and security.” The United States and 15 other countries called for the meeting.

Not surprisingly, different countries had different points of view. These ranged from “we have local regulations” to giant nation state assertions about bad actions by governments being more important to it is the USA’s fault.

The write up from the ubiquitous intelligence commentator did not include any history, context, or practical commentary about the diffusion of awareness of intelware or what the article, the UN, and my 90 year old neighbor calls spyware.

The public awareness of intelware coincided with hacks of some highly regarded technology. I am not going to name this product, but if one pokes about one might find documentation, code snippets, and even some conference material. Ah, ha. The conference material was obviously designed for marketing. Yes, that is correct. Conferences are routinely held in which the participants are vetted and certain measures put in place to prevent leakage of these materials. However, once someone passes out a brochure, the information is on the loose and can be snagged by a curious reporter who wants to do good. Also, some conference organizers themselves make disastrous decisions about what to post on their conference web site; for example, the presentations. I give some presentations at these closed to the public events, and I have found my slide deck on the organizer’s Web site. I won’t mention this outfit, but I don’t participate in any events associated with this outfit. Also, some conference attendees dress up as sheep and register with possibly bogus information. These folks happily snap pictures of exhibits of hardware not available to the public, record audio, and at one event held in the Hague sat in front of me and did a recording of my lecture about some odd ball research project in which I was involved. I reported the incident to the people at the conference desk. I learned that the individual left the conference and that his office telephone number was bogus. That’s enough. Leaks do occur. People are careless. Others just clever and duplicitous.

image

Thanks, You.com. You are barely able to manage a “good enough” these days. Money problems? Yeah, too bad. My heart bleeds for you.

However, the big reveal of intelware and its cousin policeware coincided with the push by one nation state. I won’t mention the country, but here’s how I perceived what kicked into high gear in 2005 or so. A number of start ups offered data analytics. The basic pitch was that these outfits had developed a suite of procedures to make sense of data. If the client had data, these companies could import the information and display important points identified by algorithms about the numbers, entities, and times. Marketers were interested in these systems because, like the sale pitches for AI today, the Madison Avenue crowd could dispense with the humans doing the tedious hand work required to make sense of pharmaceutical information. Buy, recycle, or create a data set. Then import it into these systems. Business intelligence spills forth. Leaders in this field did not disclose their “roots” in the intelligence community of the nation encouraging its entrepreneurs to commercialize what they learned when fulfilling their government military service.

Where did the funding come from? The nation state referenced provided some seed funds. However, in order to keep these systems in line with customer requirements for analyzing the sales of shampoo and blockbuster movies. Venture firms with personnel familiar with the nation state’s government software innovations were invited to participate in funding some of these outfits. One of them is a very large publicly traded company. This firm has a commercial sales side and a government sales side. Some readers of this post will have the stock in their mutual fund stock baskets. Once a couple of these outfits hit the financial jackpot for the venture firms, the race was on.

Companies once focused squarely on serving classified entities in a government in a number of countries wanted to sanitize the software and sell to a much larger, more diverse corporate market. Today, if one wants to kick the tires of commercially available once-classified systems and methods, one can:

  1. Attend conferences about data brokering
  2. Travel to Barcelona or Singapore and contact interesting start ups and small businesses in the marketing data analysis business
  3. Sign up for free open source intelligence online events and note the names and organizations speaking. (Some of these events allow a registered attendee to conduct an off line for others but real time chat with a speaker who represents an interesting company.

There are more techniques as well to identify outfits which are in the business of providing or developing intelware and policeware tools for anyone with money. How do you find these folks? That’s easy. Dark Web searches, Telegram Group surfing, and running an advertisement for a job requiring a person with specialized experience in a region like southeast Asia.

Now let me return to the topic of the cited article: The UN’s efforts to get governments to create rules, controls, or policies for intelware and policeware. Several observations:

  1. The effort is effectively decades too late
  2. The trajectory of high powered technology is outward from its original intended purpose
  3. Greed because the software works and can generate useful results: Money or genuinely valuable information.

Agree or disagree with me? That’s okay. I did a few small jobs for a couple of these outfits and have just enough insight to point out that the article “Governments Call for Spyware Regulations in UN Security Council Meeting” presents a somewhat thin report and lacks color.

Stephen E Arnold, January 18, 2025

Racers, Start Your Work Around Engines

January 16, 2025

dino orange_thumb_thumb_thumb_thumb Prepared by a still-alive dinobaby.

Companies are now prohibited from sending our personal information to specific, hostile nations. Because tech firms must be forced to exercise common sense, apparently. TechRadar reports, "US Government Says Companies Are No Longer Allowed to Send Bulk Data to these Nations." The restriction is the final step in implementing Executive Order 14117, which President Biden signed nearly a year ago. It is to take effect at the beginning of April.

The rule names six countries the DoJ says have “engaged in a long-term pattern or serious instances of conduct significantly adverse to the national security of the United States or the security and safety of U.S. persons”: China, Cuba, Iran, North Korea, Russia, and Venezuela. Writer Benedict Collins tells us:

"The Executive Order is aimed at preventing countries generally hostile to the US from using the data of US citizens in cyber espionage and influence campaigns, as well as building profiles of US citizens to be used in social engineering, phishing, blackmail, and identity theft campaigns. The final rule sets out the threshold for transactions of data that carry an unacceptable level of risk, alongside the different classes of transactions that are prohibited, restricted or exempt. Companies that violate the order will face civil and criminal penalties."

The restriction covers geolocation data; personal identifiers like social security numbers; biometric identifiers; personal health data; personal financial information; and data on our very cells. The agency clarifies some activities that are not prohibited:

"The DoJ also outlined the final rule does not apply to ‘medical, health, or science research or the development and marketing of new drugs’ and ‘also does not broadly prohibit U.S. persons from engaging in commercial transactions, including exchanging financial and other data as part of the sale of commercial goods and services with countries of concern or covered persons, or impose measures aimed at a broader decoupling of the substantial consumer, economic, scientific, and trade relationships that the United States has with other countries.’"

So, outside those exceptions, the idea is that US firms will not be sending our personal data to these hostile countries. That is the theory. However, organizations gather data from mobile phone apps, from exfiltrated mobile phone records, from “gray” data aggregators. How does one find entities providing conduits for information outflows? A bit of sleuthing on Telegram or searches on Dark Web search engines provide a number of contact points. Are the data reliable, accurate, and timely? Bad data are plentiful, but by acquiring or assembling information, bad actors send out their messages. Volume and human nature work.

Cynthia Murrell, January 16, 2025

FOGINT: Telegram Sends Message: We Are Coming to America!

January 15, 2025

fog from gifer 8AC8 small A short blog post from the FOGINT team.

In 1988, Eddie Murphy starred in the film Coming to America. The film features this bit of dialogue:

  • Lisa McDowell: So why did you come here?
  • Prince Akeem: To find something special.
  • Lisa McDowell: It’s a long way to travel.
  • Prince Akeem: No journey is too great when one finds what he seeks.

What Telegram and its wing man, the Open Network Foundation, seek is a new market. Telegram, since the detainment of Pavel Durov (Telegram’s founder) has been pushing crypto. Pushing hard. Now the organization with more than 900 million users is coming to America. “No journey is too great when one finds what he seeks.” And what Pavel Durov seeks is a market for online gambling linked to crypto currency. Online gambling, link ups with organizations mostly unknown in the US, and a messaging system with a mind-boggling range of features.

image

Pavel Durov is coming to the New World, a land of opportunity for crypto and certain interests unlikely to be aligned with those of the United States and its allies. Thanks, creative You.com. Good enough.

Bloomberg published “Telegram Linked TON Blockchain to Expand in US As Trump Courts Crypto.” Similar stores have appeared in Cryptobriefing, Cryptotimes, and Cryptonews, among others. For example, “Telegram-Linked TON Eyeing U.S. Expansion” reports:

The TON Foundation, associated with Telegram Messenger, is planning to expand into the U.S. market, anticipating more favorable regulatory conditions under President-elect Donald Trump. As part of its U.S. expansion strategy, the foundation has appointed Manuel Stotz, founder of Kingsway Capital Partners, as its new president.

The film was a comedy. Telegram’s return to the United States is an important step. Telegram is not just a messenger service used by warfighters, purveyors of contraband, and goofy pitches for get rich schemes originating in Myanmar. Telegram is different from Signal, Threema, and WhatsApp. The decentralized organized organization has a social media component, a recruitment program, a venture fund, some smart software, and a conceptual commitment to ideas somewhat different from those in the US and some countries in Western Europe, including France where Pavel Durov is confined to the country as a legal proceeding involving him moves forward through the French judicial system. 

As Prince Akeem said, “No journey is too great when one finds what he seeks.” Mr. Durov has found what he seeks. Telegram in America.

Stephen E Arnold, January 15, 2025

FOGINT: Are Secure Communications Possible? DekkoSecure Says, “Yes

January 15, 2025

fog from gifer 8AC8 small Prepared by the FOGINT research team.

For a project in 2023 and 2024, the FOGINT team worked on secure communications. We discovered that most of the alleged end-to-end messaging systems were not secure. The firm commissioning our report seemed surprised when we identified common points of vulnerability in existing E2EE systems. Furthermore, the FOGINT team itself was impressed with a handful of organizations resolving secure messaging issues in well-engineered ways. Furthermore, we noted that some of the most significant secure communication tools were drowned out by the consumer-centric solutions available. The idea that by making certain software available as open source was proof that these tools were indeed secure.

A telling example is the perception of Telegram Messenger as an end-to-end solution. It is not. And what about Zoom, a service which exploded during the Covid panic. Presumably hiring a “security guru” solved its problems of Zoom bombing and delivered “total security” addressed Zoom’s issues. That high profile hiring delivered PR, not security.

FOGINT wants to provide some information about a secure communications service that does provide a secure way to share content in image, audio, video, or text form. The solution was developed by Dmytro Bablinyuk and Jay Haybatov. In 2015 DekkoSecure began marketing its system. In the last decade DekkoSecure has emerged as a reliable provider of secure communication and collaboration tools, with a specialization in encrypted solutions tailored for the law enforcement, legal, healthcare, defense and government sectors. Their comprehensive platform seamlessly integrates four main product lines, each designed to address critical security and usability needs.

The firm’s Digital Signature Software offers robust features such as audit trails for document tracking, mobile signature support, customizable templates, automated reminder systems, and strong authentication protocols. This software ensures that document signing processes are both secure and efficient, meeting the stringent requirements of various industries. Key features of the solution include:

  • Secure File Sharing is another cornerstone of DekkoSecure’s platform, providing end-to-end encryption for files both in transit and at rest. It supports real-time collaboration, version control, integrated workflow management, and a user-friendly drag-and-drop interface. These features enable secure and efficient file management and collaboration across teams.
  • The company’s Cloud Storage Service boasts granular access controls, cross-device synchronization, compliant archiving and retention, and version history management. This service ensures that sensitive data is stored securely, accessible when needed, and meets regulatory compliance standards. The firm’s Zero Trust/Zero Knowledge encryption is new to the U.S. law enforcement market and provides clients comfort that only authorized and authenticated users can access files, which includes DekkoSecure not having access to the files.
  • Security Software — The company incorporates protection from bots, viruses and malware and incorporating a screening process for all files uploaded to the users system.

Key competitive advantages of DekkoSecure include its all-in-one platform integration, user-friendly interface, strong security focus, and a comprehensive feature set. These strengths make it an attractive option for various target markets, including small to medium-sized businesses, large enterprises, government agencies, and remote workforces.

However, DekkoSecure faces certain challenges. The system is tailored to the needs of law enforcement, courts, and healthcare. The company employs a data usage pricing structure and does not limit the number of users in an organization. Also, although the system is easy-to-use, the firm’s engineers work with clients to ensure that the platform has the processes, look and feel they require prior to implementation. And, looking ahead to 2025, DekkoSecure will benefit from the US FBI’s suggestion that encrypted communications become the standard for organizations and individuals.

Net net: DekkoSecure’s focus on encryption and user experience, combined with its broad feature set, makes it particularly appealing to organizations handling sensitive data. Despite the platform’s complexity posing challenges for some users, its integrated approach to secure communication and collaboration offers significant value for businesses seeking to consolidate their security tools.

Stephen E Arnold, January 15, 2025

The AI Profit and Cost Race: Drivers, Get Your Checkbooks Out

January 15, 2025

Hopping Dino_thumb_thumbA dinobaby-crafted post. I confess. I used smart software to create the heart wrenching scene of a farmer facing a tough 2025.

Microsoft appears ready to spend $80 billion “on AI-enabled data centers” by December 31, 2025. Half of the money will go to US facilities, and the other half, other nation states. I learned this information from a US cable news outfit’s article “Microsoft Expects to Spend $80 Billion on AI-Enabled Data Centers in Fiscal 2025.” Is Microsoft tossing out numbers as part of a marketing plan to trigger the lustrous Google, or is Microsoft making clear that it is going whole hog for smart software despite the worries of investors that an AI revenue drought persists? My thought is that Microsoft likes to destabilize the McKinsey-type thinking at Google, wait for the online advertising giant to deliver another fabulous Sundar & Prabhakar Comedy Tour, and then continue plodding forward.

The write up reports:

Several top-tier technology companies are rushing to spend billions on Nvidia graphics processing units for training and running AI models. The fast spread of OpenAI’s ChatGPT assistant, which launched in late 2022, kicked off the AI race for companies to deliver their own generative AI capabilities. Having invested more than $13 billion in OpenAI, Microsoft provides cloud infrastructure to the startup and has incorporated its models into Windows, Teams and other products.

Yep, Google-centric marketing.

image

Thanks, You.com. Good enough.

But if Microsoft does spend $80 billion, how will the company convert those costs into a profit geyser? That’s a good question. Microsoft appears to be cooperating with discounts for its mainstream consumer software. I saw advertisements offering Windows 11 Professional for $25. Other deep discounts can be found for Office 365, Visio, and even the bread-and-butter sales pitch PowerPoint application.

Tweaking Google is one thing. Dealing with cost competition is another.

I noted that the South China Morning Post’s article “Alibaba Ties Up with Lee Kai-fu’s Unicorn As China’s AI Sector Consolidates.” Tucked into that rah rah write up was this statement:

The cooperation between two of China’s top AI players comes as price wars continue in the domestic market, forcing companies to further slash prices or seek partnerships with former foes. Alibaba Cloud said on Tuesday it would reduce the fees for using its visual reasoning AI model by up to 85 per cent, the third time it had marked down the prices of its AI services in the past year. That came after TikTok parent ByteDance last month cut the price of its visual model to 0.003 yuan (US$0.0004) per thousand token uses, about 85 per cent lower than the industry average.

The message is clear. The same tactic that China’s electric vehicle manufacturers are using will be applied to smart software. The idea is that people will buy good enough products and services if the price is attractive. Bean counters intuitively know that a competitor that reduces prices and delivers an acceptable product can gain market share. The companies unable to compete on price face rising costs and may be forced to cut their prices, thus risking financial collapse.

For a multi-national company, the cost of Chinese smart software may be sufficiently good to attract business. Some companies which operate under US sanctions and controls of one type or another may be faced with losing some significant markets. Examples include Brazil, India, Middle Eastern nations, and others. That means that a price war can poke holes in the financial predictions which outfits like Microsoft are basing some business decisions.

What’s interesting is that this smart software tactic apparently operating in China fits in with other efforts to undermine some US methods of dominating the world’s financial system. I have no illusions about the maturity of the AI software. I am, however, realistic about the impact of spending significant sums with the fervent belief that a golden goose will land on the front lawn of Microsoft’s headquarters. I am okay with talking about AI in order to wind up Google. I am a bit skeptical about hosing $80 billion into data centers. These puppies gobble up power, which is going to get expensive quickly if demand continues to blast past the power generation industry’s projections. An economic downturn in 2025 will not help ameliorate the situation. Toss in regional wars and social turmoil and what does one get?

Risk. Welcome to 2025.

Stephen E Arnold, January 15, 2025

AI Search Engine from Alibaba Grows Apace

January 15, 2025

dino orange_thumb_thumb_thumb_thumb_thumb_thumb Prepared by a still-alive dinobaby.

The Deepseek red herring has been dragged across the path of US AI innovators. A flurry of technology services wrote about Deepseek’s ability to give US smart software companies a bit of an open source challenge. The hook, however, was not just the efficacy of the approach. The killer message was, “Better, faster, and cheaper.” Yep, cheaper, the concept which raises questions about certain US outfits burning cash in units of a one billion dollars with every clock tick.

Screenshot 2025-01-12 050458

A number of friendly and lovable deer are eating the plants in Uncle Sam’s garden. How many of these are living in the woods looking for a market to consume? Thanks OpenAI, good enough.

Now Alibaba is coming for AI search. The Chinese company crows on PR Newswire, "Alibaba’s Accio AI Search Engine Hits 500,000 SME User Milestone." Sounds like a great solution for US businesses doing work for the government. The press release reveals:

"Alibaba International proudly announces that its artificial intelligence (AI)-powered business-to-business (B2B) search engine for product sourcing, Accio, has reached a significant milestone since its launch in November 2024, currently boasting over 500,000 small and medium-sized enterprise (SME) users. … During the peak global e-commerce sales seasons in November and December, more than 50,000 SMEs worldwide have actively used Accio to source inspirations for Black Friday and Christmas inventory stocking. User feedback shows that the search engine helped them achieve this efficiently. Accio now holds a net promoter score (NPS) exceeding 50[1], indicating a high level of customer satisfaction. On December 13, 2024, the dynamic search engine was also named ‘Product of the Day’ on Product Hunt, a site that curates new products in tech, further cementing its status as an indispensable tool for SME buyers worldwide."

Well, good for them. And, presumably, for China ‘s information gathering program. Founded in 1999, Alibaba Group is based in Hangzhou, Zhejiang. One can ask many questions about Alibaba, including ones related to the company’s interaction with Chinese government officials. When a couple of deer are eating one’s garden vegetables, a good question to ask is, “How many of these adorable creatures live in the woods?” One does not have to be Natty Bumpo to know that the answer is, “There are more where those came from.”

Cynthia Murrell, January 15, 2025

Agentic Workflows and the Dust Up Between Microsoft and Salesforce

January 14, 2025

dino orange_thumb_thumb_thumb_thumb_thumb_thumb_thumb_thumb Prepared by a still-alive dinobaby.

The Register, a UK online publication, does a good job of presenting newsworthy events with a touch of humor. Today I spotted a new type of information in the form of an explainer plus management analysis. Plus the lingo and organization suggest a human did all or most of the work required to crank out a very good article called “In AI Agent Push, Microsoft Re-Orgs to Create CoreAI – Platform and Tools Team.”

I want to highlight the explainer part of the article. The focus is on the notion of agentic; specifically:

agentic applications with memory, entitlements, and action space that will inherit powerful model capabilities. And we will adapt these capabilities for enhanced performance and safety across roles, business processes, and industry domains. Further, how we build, deploy, and maintain code for these AI applications is also fundamentally changing and becoming agentic.

These words are attributed to Microsoft’s top dog Satya Nadella, but they sound as if one of the highly paid wordsmiths laboring for the capable Softies. Nevertheless, the idea is important. In order to achieve the agentic pinnacle, Microsoft has to reorganize. Whoever can figure out how to make agentic applications work across different vendors’ solutions will be able to make money. That’s the basic idea: Smart software is going to create a new big thing for enterprise software and probably some consumers.

The write up explains:

It’s arguably just plain old software talking to plain old software, which would be nothing new. The new angle here, though, is that it’s driven mainly by, shall we say, imaginative neural networks and models making decisions, rather than algorithms following entirely deterministic routes. Which is still software working with software. Nadella thinks building artificially intelligent agentic apps and workflows needs “a new AI-first app stack — one with new UI/UX patterns, runtimes to build with agents, orchestrate multiple agents, and a reimagined management and observability layer.”

To win the land in this new territory, Microsoft must have a Core AI team. Google and Salesforce presumably have this type of set up. Microsoft has to step up its AI efforts. The Register points out:

Nadella noted that “our internal organizational boundaries are meaningless to both our customers and to our competitors”. That’s an odd observation given Microsoft published his letter, which concludes with this observation: “Our success in this next phase will be determined by having the best AI platform, tools, and infrastructure. We have a lot of work to do and a tremendous opportunity ahead, and together, I’m looking forward to building what comes next.”

Here’s what I found interesting:

  1. Agentic is the next big thing in smart software. Essentially smart software that does one thing is useful. Orchestrating agents to do a complex process is the future. The software decides. Everything works well — at least, that’s the assumption.
  2. Microsoft, like Google, is now in a Code Yellow or Code Red mode. The company feels the heat from Salesforce. My hunch is that Microsoft knows that add ins like Ghostwriter for Microsoft Office is more useful than Microsoft’s own Copilot for many users. If the same boiled fish appears on the enterprise menu, Microsoft is in a world of hurt from Salesforce and probably a lot of other outfits.
  3. The re-org parallels the disorder that surfaced at Google when it fixed up its smart software operation or tried to deal with the clash of the wizards in that estimable company. Pushing boxes around on an organization chart is honorable work, but that management method may not deliver the agentic integration some people want.

The conclusion I drew from The Register’s article is that the big AI push and the big players’ need to pop up a conceptual level in smart software is perceived as urgent. Costs? No problem. Hallucination? No problem. Hardware availability? No problem. Software? No problem. A re-organization is obvious and easy. No problem.

Stephen E Arnold, January 14, 2025

More about NAMER, the Bitext Smart Entity Technology

January 14, 2025

dino orangeA dinobaby product! We used some smart software to fix up the grammar. The system mostly worked. Surprised? We were.

We spotted more information about the Madrid, Spain based Bitext technology firm. The company posted “Integrating Bitext NAMER with LLMs” in late December 2024. At about the same time, government authorities arrested a person known as “Broken Tooth.” In 2021, an alert for this individual was posted. His “real” name is Wan Kuok-koi, and he has been in an out of trouble for a number of years. He is alleged to be part of a criminal organization and active in a number of illegal behaviors; for example, money laundering and human trafficking. The online service Irrawady reported that Broken Tooth is “the face of Chinese investment in Myanmar.”

Broken Tooth (né Wan Kuok-koi, born in Macau) is one example of the importance of identifying entity names and relating them to individuals and the organizations with which they are affiliated. A failure to identify entities correctly can mean the difference between resolving an alleged criminal activity and a get-out-of-jail-free card. This is the specific problem that Bitext’s NAMER system addresses. Bitext says that large language models are designed for for text generation, not entity classification. Furthermore, LLMs pose some cost and computational demands which can pose problems to some organizations working within tight budget constraints. Plus, processing certain data in a cloud increases privacy and security risks.

Bitext’s solution provides an alternative way to achieve fine-grained entity identification, extraction, and tagging. Bitext’s solution combines classical natural language processing solutions solutions with large language models. Classical NLP tools, often deployable locally, complement LLMs to enhance NER performance.

NAMER excels at:

  1. Identifying generic names and classifying them as people, places, or organizations.
  2. Resolving aliases and pseudonyms.
  3. Differentiating similar names tied to unrelated entities.

Bitext supports over 20 languages, with additional options available on request. How does the hybrid approach function? There are two effective integration methods for Bitext NAMER with LLMs like GPT or Llama are. The first is pre-processing input. This means that entities are annotated before passing the text to the LLM, ideal for connecting entities to knowledge graphs in large systems. The second is to configure the LLM to call NAMER dynamically.

The output of the Bitext system can generate tagged entity lists and metadata for content libraries or dictionary applications. The NAMER output can integrate directly into existing controlled vocabularies, indexes, or knowledge graphs. Also, NAMER makes it possible to maintain separate files of entities for on-demand access by analysts, investigators, or other text analytics software.

By grouping name variants, Bitext NAMER streamlines search queries, enhancing document retrieval and linking entities to knowledge graphs. This creates a tailored “semantic layer” that enriches organizational systems with precision and efficiency.

For more information about the unique NAMER system, contact Bitext via the firm’s Web site at www.bitext.com.

Stephen E Arnold, January 14, 2025

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta