CEM Platform Clarabridge 7 Supports Silo Elimination

November 10, 2015

The move to eliminate data silos in the corporation has gained another friend, we learn in Direct Marketing News’ piece, “Clarabridge Joins the Burn-Down-the-Silos Movement.” With their latest product release, the customer experience management firm hopes to speed their clients’ incorporation of business intelligence and feedback. The write-up announces:

“Clarabridge today released Clarabridge 7, joining the latest movement among marketing tech companies to speed actionability of data intelligence by burning down the corporate silos. The new release’s CX Studio promises to provide users a route to exploring the full customer journey in an intuitive manner. A new dashboard and authoring capability allows for “massive rollout,” in Clarabridge’s terms, across an entire enterprise.

“Also new are role-based dashboards that translate data in a manner relevant to specific roles, departments, and levels in an organization. The company claims that such personalization lets users take intelligence and feedback and put it immediately into action. CX Engagor expedites that by connecting business units directly with consumers in real time.”

We have to wonder whether this rush to “burn the silos” will mean that classified information will get out; details germane to a legal matter, for example, or health information or financial data. How can security be applied to an open sea of data?

Clarabridge has spent years developing its sentiment and text analytics technology, and asserts it is uniquely positioned to support enterprise-scale customer feedback initiatives. The company maintains offices in Barcelona, London, San Francisco, Singapore, and Washington, DC. They also happen to be hiring as of this writing.

Cynthia Murrell, November 10, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Photo Farming in the Early Days

November 9, 2015

Have you ever wondered what your town looked like while it was still urban and used as farmland?  Instead of having to visit your local historical society or library (although we do encourage you to do so), the United States Farm Security Administration and Office Of War Information (known as  FSA-OWI for short) developed Photogrammer.  Photogrammer is a Web-based image platform for organizing, viewing, and searching farm photos from 1935-1945.

Photogrammer uses an interactive map of the United States, where users can click on a state and then a city or county within it to see the photos from the timeline.  The archive contains over 170,000 photos, but only 90,000 have a geographic classification.  They have also been grouped by the photographer who took the photos, although it is limited to fifteen people.  Other than city, photographer, year, and month, the collection c,an be sorted by collection tags and lot numbers (although these are not discussed in much detail).

While farm photographs from 1935-1945 do not appear to need their own photographic database, the collection’s history is interesting:

“In order to build support for and justify government programs, the Historical Section set out to document America, often at her most vulnerable, and the successful administration of relief service. The Farm Security Administration—Office of War Information (FSA-OWI) produced some of the most iconic images of the Great Depression and World War II and included photographers such as Dorothea Lange, Walker Evans, and Arthur Rothstein who shaped the visual culture of the era both in its moment and in American memory. Unit photographers were sent across the country. The negatives were sent to Washington, DC. The growing collection came to be known as “The File.” With the United State’s entry into WWII, the unit moved into the Office of War Information and the collection became known as the FSA-OWI File.”

While the photos do have historical importance, rather than creating a separate database with its small flaws, it would be more useful if it was incorporated into a larger historical archive, like the Library of Congress, instead of making it a pet project.

Whitney Grace, November 9, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Banks Turn to Blockchain Technology

November 9, 2015

Cryptocurrency has come a long way, and now big banks are taking the technology behind Bitcoin very seriously, we learn in “Nine of the World’s Biggest Banks Form Blockchain Partnership” at Re/code. Led by financial technology firm R3, banks are signing on to apply blockchain tech to the financial markets. A few of the banks involved so far include Goldman Sacks, Barclays, JP Morgan, Royal Bank of Scotland, Credit Suisse, and Commonwealth Bank of Australia. The article notes:

“The blockchain works as a huge, decentralized ledger of every bitcoin transaction ever made that is verified and shared by a global network of computers and therefore is virtually tamper-proof. The Bank of England has a team dedicated to it and calls it a ‘key technological innovation.’ The data that can be secured using the technology is not restricted to bitcoin transactions. Two parties could use it to exchange any other information, within minutes and with no need for a third party to verify it. [R3 CEO David] Rutter said the initial focus would be to agree on an underlying architecture, but it had not yet been decided whether that would be underpinned by bitcoin’s blockchain or another one, such as one being built by Ethereum, which offers more features than the original bitcoin technology.”

Rutter did mention he expects this tech to be used post-trade, not directly in exchange or OTC trading, at least not soon. It is hoped the use of blockchain technology will increase security while reducing security and errors.

Cynthia Murrell, November 9, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Pew Report Compares News Sources: Twitter and Facebook

November 6, 2015

As newspapers fall, what is rising to take their place? Why, social media, of course. The Pew Research Center discusses its recent findings on the subject in, “The Evolving Role of News on Twitter and Facebook.” The number of Americans getting their news from these platforms continues to rise, across almost all demographic groups. The article informs us:

“The new study, conducted by Pew Research Center in association with the John S. and James L. Knight Foundation, finds that clear majorities of Twitter (63%) and Facebook users (63%) now say each platform serves as a source for news about events and issues outside the realm of friends and family. That share has increased substantially from 2013, when about half of users (52% of Twitter users, 47% of Facebook users) said they got news from the social platforms.”

The write-up describes some ways the platforms differ in their news delivery. For example, more users turn to Twitter for breaking news, while Facebook now features a  “Trending” sidebar, filterable by subject. The article notes that these trends can have an important impact on our society:

“As more social networking sites recognize and adapt to their role in the news environment, each will offer unique features for news users, and these features may foster shifts in news use. Those different uses around news features have implications for how Americans learn about the world and their communities, and for how they take part in the democratic process.”

Indeed. See the article for more differences between Facebook and Twitter news consumers, complete with some percentages. You can also see the data’s barebones results in the report’s final topline. Most of the data comes from a survey conducted across two weekends last March, among 2,035 Americans aged 18 and up.

Cynthia Murrell, November 6, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Continues to Improve Voice Search

November 5, 2015

Google’s research arm continues to make progress on voice search. The Google Research Blog updates us in, “Google Voice Search: Faster and More Accurate.” The Google Speech Team begins by referring back to 2012, when they announced their Deep Neural Network approach. They have since built on that concept; the team now employs a couple of models built upon recurrent neural networks, which they note are fast and accurate: connectionist temporal classification and sequence discriminative (machine) training techniques. The write-up goes into detail about how speech recognizers work and what makes their latest iteration the best yet. I found the technical explanation fascinating, but it is too lengthy to describe here; please see the post for those details.

I am still struck when I see any article mention that an algorithm has taken the initiative. This time, researchers had to rein in their model’s insightful decision:

“We now had a faster and more accurate acoustic model and were excited to launch it on real voice traffic. However, we had to solve another problem – the model was delaying its phoneme predictions by about 300 milliseconds: it had just learned it could make better predictions by listening further ahead in the speech signal! This was smart, but it would mean extra latency for our users, which was not acceptable. We solved this problem by training the model to output phoneme predictions much closer to the ground-truth timing of the speech.”

At least the AI will take direction. The post concludes:

“We are happy to announce that our new acoustic models are now used for voice searches and commands in the Google app (on Android and iOS), and for dictation on Android devices. In addition to requiring much lower computational resources, the new models are more accurate, robust to noise, and faster to respond to voice search queries – so give it a try, and happy (voice) searching!”

We always knew natural-language communication with machines would present huge challenges, ones many said could never be overcome. It seems such naysayers were mistaken.

Cynthia Murrell, November 5, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Journalists Use Dark Web Technology to Protect Source Privacy

November 4, 2015

Canada’s paper the Globe and Mail suggests those with sensitive information to reveal some Dark Web tech: “SecureDrop at the Globe and Mail.” As governments get less squeamish about punishing whistleblowers, those with news the public deserves to know must  be increasingly careful how they share their knowledge. The website begins by informing potential SecureDrop users how to securely connect through the Tor network. The visitor is informed:

“The Globe and Mail does not log any of your interactions with the SecureDrop system, including your visit to this page. It installs no tracking cookies or tracking software of any kind on your computer as part of the process. Your identity is not exposed to us during the upload process, and we do not know your unique code phrase. This means that even if a code phrase is compromised, we cannot comply with demands to provide documents that were uploaded by a source with that code phrase. SecureDrop itself is an open-source project that is subject to regular security audits, reducing the risk of bugs that could compromise your information. Information provided through SecureDrop is handled appropriately by our journalists. Journalists working with uploaded files are required to use only computers with encrypted hard drives and follow security best practices. Anonymous sources are a critical element of journalism, and The Globe and Mail has always protected its sources to the best of its abilities.

The page closes with a warning that no communication can be perfectly secure, but that this system is closer than most. Will more papers take measures to ensure folks can speak up without being tracked down?

Cynthia Murrell, November 4, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Hacks to Make You Grin

October 30, 2015

Google is run by a bunch of geeks that entertain themselves using the high tech toys at their fingertips.  Beyond the insertion of Douglas Adams references in search results, there are other Google hacks that the tech geeks developed to make themselves and you smile.  Digital Spy tracked down “Eleven Google Secrets That Will Change The Way You Search, From Playing Pac-Man To Lego Street View.”

“Day after day you hammer out search after search, overlooking not only the hidden gems lurking beneath the surface, but the very thing that makes Google such an anomaly amongst the world’s biggest companies – its sense of humor. Here are a few thinks you might not have known you can do in Google.”

Google can do numerous things just by typing a few simple commands into the search bar.  Try typing: “askew” or “tilt,” “do a barrel roll,” and “Zerg rush.”  Google is also a time machine and can take you back to the 1998 Google interface or you can spend hours playing Pac-Man on an uploaded Google Doodle from May 2010.  The yellow stick figure on Google Street View also likes to play dress-up when he visits certain places.

But our absolute favorite is the six degrees of Kevin Bacon calculator.  Based off an old Internet meme that everyone in Hollywood has worked with Kevin Bacon in less than six degrees, type in a famous person and “bacon number” to find out how close their careers are.

Little hacks and fun games like this show the human side to the Google empire.  What will they think of next?  However, it would be nice if Google added some practical functions, such as a time and date feature.

Whitney Grace, October 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

CSI Search Informatics Are Actually Real

October 29, 2015

CSI might stand for a popular TV franchise, but it also stands for “compound structured identification” Phys.org explains in “Bioinformaticians Make The Most Efficient Search Engine For Molecular Structures Available Online.” Sebastian Böcker and his team at the Friedrich Schiller University are researching metabolites, chemical compounds that determine an organism’s metabolism.  Metabolites are used to gauge information about the condition of living cells.

While this is amazing science there are some drawbacks:

“This process is highly complex and seldom leads to conclusive results. However, the work of scientists all over the world who are engaged in this kind of fundamental research has now been made much easier: The bioinformatics team led by Prof. Böcker in Jena, together with their collaborators from the Aalto-University in Espoo, Finland, have developed a search engine that significantly simplifies the identification of molecular structures of metabolites.”

The new search works like a regular search engine, but instead of using keywords it searches through molecular structure databases containing information and structural formulae of metabolites.  The new search will reduce time in identifying the compound structures, saving on costs and time.  The hope is that the new search will further research into metabolites and help researchers spend more time working on possible breakthroughs.

Whitney Grace, October 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The PurePower Geared Turbofan Little Engine That Could

October 29, 2015

The article on Bloomberg Business titled The Little Gear That Could Reshape the Jet Engine conveys the 30 year history of Pratt & Whitney’s new PurePower Geared Turbofan aircraft engines. These are impressive machines, they burn less fuel, pollute less, and produce 75% less noise. But thirty years in the making? The article explains,

“In Pratt’s case, it required the cooperation of hundreds of engineers across the company, a $10 billion investment commitment from management, and, above all, the buy-in of aircraft makers and airlines, which had to be convinced that the engine would be both safe and durable. “It’s the antithesis of a Silicon Valley innovation,” says Alan Epstein, a retired MIT professor who is the company’s vice president for technology and the environment. “The Silicon Valley guys seem to have the attention span of 3-year-olds.”

It is difficult to imagine what, if anything, “Silicon Valley guys” might develop if they spent three decades researching, collaborating, and testing a single project. Even more so because of the planned obsalesence of their typical products seeming to speed up every year. In the case of this engine, the article suggests that the time spent has positives and negatives for the company- certain opportunities with big clients were lost along the way, but the dedicated effort also attracted new clients.

Chelsea Kerwin, October 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Neglect Exposes Private Medical Files

October 28, 2015

Data such as financial information and medical files are supposed to be protected behind secure firewalls and barriers that ensure people’s information does not fall into the wrong hands.  While digital security is at the best it has ever been, sometimes a hacker does not to rely on his/her skills to get sensitive information.  Sometimes all they need to do is wait for an idiotic mistake, such as what happened on Amazon Web Services wrote Gizmodo in “Error Exposes 1.5 Million People’s Private Records On Amazon Web Services.”

Tech junkie Chris Vickery heard a rumor that “strange data dumps” could appear on Amazon Web Services, so he decided to go looking for some.  He hunted through AWS, found one such dump, and it was a huge haul or it would have been if Vickery was a hacker.  Vickery discovered it was medical information belonging to 1.5 million people and from these organizations: Kansas’ State Self Insurance Fund, CSAC Excess Insurance Authority, and the Salt Lake County Database.

“The data came from Systema Software, a small company that manages insurance claims. It still isn’t clear how the data ended up on the site, but the company did confirm to Vickery that it happened.  Shortly after Vickery made contact with the affected organizations, the database disappeared from the Amazon subdomain.”

The 1.5 million people should be thanking Vickery, because he alerted these organizations and the data was immediately removed from the Amazon cloud.  It turns out that Vickery was the only one to access the data, but it begs the question what would happen if a malicious hacker had gotten hold of the data?  You can count on that the medical information would have been sold to the highest bidder.

Vickery’s discovery is not isolated.  Other organizations are bound to be negligent in data and your personal information could be posted in an unsecure area.  How can you get organizations to better protect your information?  Good question.

Whitney Grace, October 28, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta