There Is a Hole in the Cloud

January 11, 2016

Everyone is running to the cloud to reserve their own personal data spot.  Companies have migrated their services to the cloud to serve a growing mobile clientele.  If you are not on the cloud, it is like you’re still using an old flip phone.  The cloud is a viable and useful service that allows people to access their data anytime and anywhere.  Business Insider reveals that cloud usage is heavily concentrated in the US:  “Latest Data From The Valley’s Oldest VC Firm Shows One Big Flaw In The Hype Around The Cloud.”

Bessemer Venture Partners is the longest running venture capitalist company in Silicon Valley.  To celebrate its 100th cloud investment, it surveyed where the company’s cloud investments are located.  Seventy-six of the startups are in the US, eleven are in Israel, and four are in Canada.

“The fact that less than one-quarter of BVP’s cloud investments are in non-US startups shows the adoption of cloud technologies is lagging in the rest of the world. It’s also a reminder that, even after all these years of cloud hype, many countries are still concerned about some aspects of cloud technology.”

Cloud adoption around the world is slow due to the US invents a lot of new technology and the rest of the world must catch up.  Security is another big concern and companies are hesitant to store sensitive information on a system with issues.

The cloud has only been on the market for ten years and has only gained attention in the past five.  Cell phones, laptops, and using open source software took time to catch on as well.

Whitney Grace, January 11, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Long Goodbye of Internet Freedom Heralded by CISA

January 8, 2016

The article on MotherBoard titled Internet Freedom Is Actively Dissolving in America paints a bleak picture of our access to the “open internet.” In spite of the net neutrality win this year, broadband adoption is decreasing, and the number of poor Americans forced to choose between broadband and smartphone internet is on the rise. In addition to these unfortunate trends,

“Congress and President Obama made the Cybersecurity Information Sharing Act a law by including it in a massive budget bill (as an extra gift, Congress stripped away some of the few privacy provisions in what many civil liberties groups are calling a “surveillance bill”)… Finally, the FBI and NSA have taken strong stands against encryption, one of the few ways that activists, journalists, regular citizens, and yes, criminals and terrorists can communicate with each other without the government spying.”

What this means for search and for our access to the Internet in general, is yet to be seen. The effects of security laws and encryption opposition will obviously be far-reaching, but at what point do we stop getting the information that we need to be informed citizens?

And when you search, if it is not findable, does the information exist?

 

Chelsea Kerwin, January 8, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Magnetic Forensics Partners with In-Q-Tel to Battle Rising Cyber Crimes

January 6, 2016

The article on GCN titled In-Q-Tel Invests in Digital Forensics Firm discusses the recent addition of Magnetic Forensics to the In-Q-Tel investment portfolio. Digital forensics software is making large strides to improve the safety and security of data in a time when hackers seem unstoppable, and this is the area Magnetic Forensics’ applies expertise and innovation. In-Q-Tel is a technology investment firm that supports and coordinates with the CIA and Intelligence Community. The article explains,

Magnetic Forensics’ flagship product, Internet Evidence Finder, recovers unstructured data — such as social media, chat messages and e-mail from computers, smartphones and tablets — and structures the data for analysis and collaboration. It has been used by 2,700 public safety organizations in 92 counties to investigate cases related to cybercrime, terrorism, child exploitation and insider threats.

Given the almost daily reminders of the vulnerability of our data, investment in this sort of software is timely. Magnetic Forensics’ CEO Adam Belsher explained that IEF works by opening the pipeline of investigator workflow, organizing backlogs, and urgently absorbing the facts of the case to ensure a comprehensive understanding of the issue at hand. Additionally, the partnership will enhance In-Q-Tel’s existing product line while allowing for the creation of new resources for cyber security.

Chelsea Kerwin, January 6, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Data Managers as Data Librarians

December 31, 2015

The tools of a librarian may be the key to better data governance, according to an article at InFocus titled, “What Librarians Can Teach Us About Managing Big Data.” Writer Joseph Dossantos begins by outlining the plight data managers often find themselves in: executives can talk a big game about big data, but want to foist all the responsibility onto their overworked and outdated IT departments. The article asserts, though, that today’s emphasis on data analysis will force a shift in perspective and approach—data organization will come to resemble the Dewey Decimal System. Dossantos writes:

“Traditional Data Warehouses do not work unless there a common vocabulary and understanding of a problem, but consider how things work in academia.  Every day, tenured professors  and students pore over raw material looking for new insights into the past and new ways to explain culture, politics, and philosophy.  Their sources of choice:  archived photographs, primary documents found in a city hall, monastery or excavation site, scrolls from a long-abandoned cave, or voice recordings from the Oval office – in short, anything in any kind of format.  And who can help them find what they are looking for?  A skilled librarian who knows how to effectively search for not only books, but primary source material across the world, who can understand, create, and navigate a catalog to accelerate a researcher’s efforts.”

The article goes on to discuss the influence of the “Wikipedia mindset;” data accuracy and whether it matters; and devising structures to address different researchers’ needs. See the article for details on each of these (especially on meeting different needs.) The write-up concludes with a call for data-governance professionals to think of themselves as “data librarians.” Is this approach the key to more effective data search and analysis?

Cynthia Murrell, December 31, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Scientific Research Has Turned into a Safe Space

December 31, 2015

The Internet is a cold, cruel place, especially if you hang out in the comments section on YouTube, eBay forums, social media, and 4chan.  If you practice restraint and limit your social media circles to trusted individuals, you can surf the Internet without encountering trolls and haters.  Some people do not practice common sense, so they encounter many hateful situations on the Internet and as a result they demand “safe spaces.”  Safe spaces are where people do not encounter anything negative.

Safe spaces are stupid.  Period.  What is disappointing is that the “safe space” and “only positive things” has made its way into the scientific community according to Nature in the article, “‘Novel, Amazing, Innovative’: Positive Words On The Rise In Science Papers.”

The University Medical Center in the Netherlands studied the use of positive and negative words in the titles of scientific papers and abstracts from 1974-2014 published on the medical database PubMed.  The researchers discovered that positive words in titles grew from 2% in 1974 to 17.5% in 2014.  Negative word usage increased from 1.3% to 2.4%, while neutral words did not see any change.  The trend only applies to research papers, as the same test was run using published books and it showed little change.

“The most obvious interpretation of the results is that they reflect an increase in hype and exaggeration, rather than a real improvement in the incidence or quality of discoveries… The findings “fit our own observations that in order to get published, you need to emphasize what is special and unique about your study,” he says. Researchers may be tempted to make their findings stand out from thousands of others — a tendency that might also explain the more modest rise in usage of negative words.”

While there is some doubt associated with the findings, because it was only applied to PubMed.  The original research team thinks that it points to much larger problem, because not all research can be “innovative” or “novel.”  The positive word over usage is polluting the social, psychological, and biomedical sciences.

Under the table, this really points to how scientists and researchers are fighting for tenure.  What would this mean for search engine optimization if all searches and descriptions had to have a smile?  Will they even invent a safe space filter?

Whitney Grace, December 31, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

 

SEO Tips Based on Recent Google Search Quality Guidelines

December 30, 2015

Google has recently given search-engine optimization pros a lot to consider, we learn from “Top 5 Takeaways from Google’s Search Quality Guidelines and What They Mean for SEO” at Merkle’s RKG Blog. Writer Melody Pettula presents five recommendations based on Google’s guidelines. She writes:

“A few weeks ago, Google released their newest Search Quality Evaluator Guidelines, which teach Google’s search quality raters how to determine whether or not a search result is high quality.  This is the first time Google has released the guidelines in their entirety, though versions of the guidelines have been leaked in the past and an abridged version was released by Google in 2013. Why is this necessary? ‘Quality’ is no longer simply a function of text on a page; it differs by device, location, search query, and everything we know about the user. By understanding how Google sees quality we can improve websites and organic performance. Here’s a countdown of our top 5 takeaways from Google’s newest guidelines and how they can improve your SEO strategy.”

We recommend any readers interested in SEO check out the whole article, but here are the five considerations Pettula lists, from least to most important: consider user intent; supply supplementary content; guard your reputation well; consider how location affects user searches; and, finally, “mobile is the future.” On that final point, the article notes that Google is now almost entirely focused on making things work for mobile devices. SEO pros would do well to keep that new reality in mind.

Cynthia Murrell, December 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

New and Improved Hacker Methods in China

December 30, 2015

We learn from an article at Yahoo News that, “On China’s Fringes, Cyber Spies Raise Their Game.” Reporters Clare Baldwin, James Pomfret, and Jeremy Wagstaff report that hackers backed by China are using some unique methods, according to Western security experts. Search is but a tiny part of this approach but, perhaps not surprisingly, cloud storage is a factor. The article relates:

“Hackers have expanded their attacks to parking malware on popular file-sharing services including Dropbox and Google Drive to trap victims into downloading infected files and compromising sensitive information. They also use more sophisticated tactics, honing in on specific targets through so-called ‘white lists’ that only infect certain visitors to compromised websites. Security experts say such techniques are only used by sophisticated hackers from China and Russia, usually for surveillance and information extraction. The level of hacking is a sign, they say, of how important China views Hong Kong, where 79 days of protests late last year brought parts of the territory, a major regional financial hub, to a standstill. The scale of the protests raised concerns in Beijing about political unrest on China’s periphery. ‘We’re the most co-ordinated opposition group on Chinese soil, (and) have a reasonable assumption that Beijing is behind the hacking,’ said Lam Cheuk-ting, chief executive of Hong Kong’s Democratic Party, which says it has been a victim of cyber attacks on its website and some members’ email accounts.”

Officially, China’s Defense Ministry denies any connection to the attacks, but that is nothing new. The adaptation of new hacking techniques is part of a continuing cycle; as journalists, scholars, and activists improve their security, hackers adapt. See the article for specifics on some attacks attributed to China-backed hackers, as well as some ways activists are trying to stay ahead.

Cynthia Murrell, December 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Marketing Analytics Holds Many Surprises

December 29, 2015

What I find interesting is how data analysts, software developers, and other big data pushers are always saying things like “hidden insights await in data” or “your business will turn around with analytics.”  These people make it seem like it is big thing, when it is really the only logical outcome that could entail from employing new data analytics.  Marketing Land continues with this idea in the article, “Intentional Serendipity: How Marketing Analytics Trigger Curiosity Algorithms And Surprise Discoveries.”

Serendipitous actions take place at random and cannot be predicted, but the article proclaims with the greater amount of data available to marketers that serendipitous outcomes can be optimized.   Data shows interesting trends, including surprises that make sense but were never considered before the data brought them to our attention.

“Finding these kinds of data surprises requires a lot of sophisticated natural language processing and complex data science. And that data science becomes most useful when the patterns and possibilities they reveal incorporate the thinking of human beings, who contribute the two most important algorithms in the entire marketing analytics framework — the curiosity algorithm and the intuition algorithm.”

The curiosity algorithm is the simple process of triggering a person’s curious reflex, then the person can discern what patterns can lead to a meaningful discovery.  The intuition algorithm is basically trusting your gut and having the data to back up your faith.  Together these make explanatory analytics help people change outcomes based on data.

It follows up with a step-by-step plan about how to organize your approach to explanatory analytics, which is a basic business plan but it is helpful to get the process rolling.  In short, read your data and see if something new pops up.

Whitney Grace, December 29, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Searching Google Drive Is Easier than Ever

December 29, 2015

Google search is supposed to be the most reliable and accurate search, so by proxy Google Drive should be easy to search as well, right?  Wrong!  Google Drive is like a cartoon black hole.  It has an undisclosed amount of space and things easily get lost in it.  Fear not, Google Drive users for Tech Republic has posted a nifty guide on how to use Google Drive’s search and locate your lost spreadsheets and documents: “Pro Tip: How To Use Google Drive’s New And Improved Search.”

Google drive can now be searched with more options: owner, keywords. Item name, shared with, date modified, file type, and located in.  The article explains the quickest way to search Google Drive is with the standard wildcard.  It is the search filter where you add an asterisk to any of the listed search types and viola, the search results list all viable options.  The second method is described as the most powerful option, because it is brand new advanced search feature.  By clicking on the drop down arrow box in the search box, you can access filters to limit or expand your search results.

“For anyone who depends upon Google Drive to store and manage their data, the new search tool will be a major plus. No longer will you have to dig through a vast array of search results to find what you’re looking for. Narrow the field down with the new Drive search box.”

The new search features are pretty neat, albeit standard for most databases.  Why did it take Google so long to deploy them in the first place?

Whitney Grace, December 29, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Latest Perspectives Version from Tom Sawyer

December 29, 2015

Data visualization and analysis firm Tom Sawyer announces the latest release of their flagship platform in, “Tom Sawyer Software Releases Tom Sawyer Perspectives, Version 7.1, .NET Edition.” There is a new “timeline” view, and they promise a boost to layout performance. The press release specifies:

“Users can dynamically manipulate sliders in a timeline view to choose a specific time period. Once a time period is chosen, the elements within other views are filtered and updated accordingly to hone in on events based on time of occurrence.

“Users can now see how data progresses through time and focus on the events they are most interested in. Visualize the spread of an epidemic, the progression of crime in a city, or uncover how information disseminates across an organization’s departments.

“Tom Sawyer Perspectives, Version 7.1 also includes enhanced examples and user experience. New Crime Network, Commodity Flow, and Road Safety example applications are included, the look and feel of the tutorial applications is modernized, and neighborhood retrieval is improved. In addition, many quality and performance enhancements have been made in this release, including up to 16 percent improvement in layout performance.”

The write-up includes screenshots and links to further information, so interested readers should check it out. Founded in 1992, Tom Sawyer helps organizations in fields from intelligence to healthcare make connections and draw conclusions from data. The company maintains offices around the world, but makes its headquarters in Berkeley, California. They are also hiring as of this writing.

 

Cynthia Murrell, December 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta