Libraries Failure to Make Room for Developer Librarians

October 23, 2015

The article titled Libraries’ Tech Pipeline Problem on Geek Feminism explores the lack of diverse developers. The author, a librarian, is extremely frustrated with the approach many libraries have taken. Rather than refocusing their hiring and training practices to emphasize technical skills, many are simply hiring more and more vendors, hardly a solution. The article states,

“The biggest issue I see is that we offer a fair number of very basic learn-to-code workshops, but we don’t offer a realistic path from there to writing code as a job. To put a finer point on it, we do not offer “junior developer” positions in libraries; we write job ads asking for unicorns, with expert- or near-expert-level skills in at least two areas (I’ve seen ones that wanted strong skills in development, user experience, and devops, for instance).”

The options available are that librarians either learn to code in their spare time (not viable), or enter the tech workforce temporarily and bring your skills back after a few years. This option is also full of drawbacks, especially that even white women are marginalized in the tech industry. Instead, the article stipulates the libraries need to make more room for hiring and promoting people with coding skills and interests while also joining the coding communities like Code4Lib.

 

Chelsea Kerwin, October 23, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Xendo, Can Do

October 23, 2015

While it would be lovely to access and find all important documents, emails, and Web sites within a couple clicks, users usually have to access several programs or individual files to locate their information.  Stark Industries wanted users to have the power of Google search engine without compromising their personal security.  Xendo is a private, personal search engine that connects with various services, including email servers, social media account, clouds, newsfeeds, and more.

Once all the desired user accounts are connected to Xendo, the search engine indexes all the files within the services.  The index is encrypted, so it securely processes them.  After the indexing is finished, Xendo will search through all the files and return search results displaying the content and service types related to inputted keywords.  Xendo promises that:

“After your initial index is built, Xendo automatically keeps it up-to-date by adding, removing and updating content as it changes. Xendo automatically updates your index to reflect role and permission changes in each of your connected services. Xendo is hosted in some of the most secure data-centers in the world and uses multiple layers of security to ensure your data is secured in transit and at rest, like it’s in a bank vault.”

Basic Xendo search is free for individual users with payments required for upgrades.  The basic search offers deep search, unlimited access, and unlimited content, while the other plans offer more search options based on subscription.  Xendo can be deployed for enterprise systems, but it requires a personalized quote.

Whitney Grace, October 23, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Lexmark, a Printer Supply Company, Receives Hold Rating from Analysts

October 20, 2015

The article on Dakota Financial News titled Lexmark International Given Average Recommendation of “Hold” by Brokerages (NYSE: LXK) piles on the bad news for Lexmark, a company best known for its printer supply services. It is a tough time to be in the printing business, and Lexmark has received numerous analyst ratings of “Hold” and “Sell.” The article details the trend,

“Lexmark International (NYSE:LXK) traded down 0.59% during trading on Wednesday, hitting $28.59. The company had a trading volume of 259,296 shares. Lexmark International has a one year low of $27.22 and a one year high of $47.69. The stock has a 50-day moving average of $30.27 and a 200 day moving average of $39.70. The company’s market capitalization is $1.76 billion…The company reported $0.97 earnings per share (EPS) for the quarter, beating analysts’ consensus estimates of $0.85 by $0.12. “

Certainly not a vote of confidence in Lexmark, which owns both Brainware and ISYS Search Software. The article goes into some detail about the companies other work beyond printer supplies including enterprise content and process management software and healthcare archive with integration abilities for unstructured patient information. Perhaps these extras are saving the company from falling entirely into the “sell” category and maintaining at “Hold.”

Chelsea Kerwin, October 20, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Bye-Bye Enterprise Storage

October 19, 2015

Storage is a main component of the enterprise system.  Silos store data and eventually the entire structure transforms into a legacy system, but BusinessWire says in “MapR Extends Support For SAS To Deliver Big Data Storage Independence” it is time to say good-bye to old enterprise storage.  MapR is trying to make enterprise storage obsolete with its new extended service support for SAS, a provider of business software and services.  The new partnership between allows advanced analytics with easy data preparation and integration in legacy systems, improved security, data compliance, and assurance of service level agreements.

The entire goal is to allow SAS and MapR clients to have better flexibility for advanced analytics within Hadoop as well as to help customers harvest the most usefulness our of their data.

Here is a rundown of the partnership between SAS and MapR:

“The collaboration makes available the full scope of technologies in the SAS portfolio, including SAS® LASR™ Analytic Server, SAS Visual Analytics, SAS High-Performance Analytics, and SAS Data Loader for Hadoop. Complete MapR integration delivers security and full POSIX compliance for use in “share everything architectures,” as well as enables SAS Visual Analytics to easily and securely access all data. With SAS Data Loader for Hadoop, users can prepare, cleanse and integrate data inside MapR for improved performance and then load that data in-memory into SAS LASR for visualization or analysis, all without writing code.”

Breaking away from legacy systems with old onsite storage is one of the new trends for enterprise systems.  Legacy systems are clunky, don’t necessary comply with new technology, and have slow information retrieval.  A new enterprise system using SAS and MapR’s software will last for some time, until the new trend buzzes through town.

Whitney Grace, October 19, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Coveo Touts Secure, Intelligent Cloud Search

October 19, 2015

Security is a perpetual concern, especially for those who work in the cloud. Enterprise search firm Coveo want us to know they take security very seriously. Their press release, “Coveo Completes Security Evaluation for cloud-Based Intelligent Search Offerings,” is posted at MarketWatch. The question is, “What does secure mean?” The definition may depend on one’s knowledge of the exploit world.

The write-up states:

“Marking its commitment to be the most secure intelligent search provider in the marketplace, Coveo announced that it has completed a comprehensive evaluation of data security and compliance procedures and processes. Coveo engaged with Brightline CPAs & Associates, which conducted a series of tests to evaluate the effectiveness of operations and controls that address data integrity and security. With data security threats on the rise across various industries and around the world, Coveo recognizes how important it is to provide clients of its cloud, intelligent search offerings with the highest security standards. Over the years, Coveo has implemented a set of industry-standard operations, infrastructure and services to ensure the integrity and privacy of customer data, including:

—  SOC II and SOC I examinations

—  Strong logical and physical access controls

—  Systematic application and source code scanning

—  Comprehensive background checks on all employees

—  24/7/365 live, dedicated operations and security teams

—  Formal, ongoing 3rd party compliance and security reviews”

We are reminded that Coveo was recently named “most innovative leader” for the second year running in the Gartner Enterprise Search Magic Quadrant, with that report lauding the company’s “unusually rich security functions.” Founded in 2005, Coveo maintains offices in the U.S. (SanMateo, CA), the Netherlands, and Quebec.

Cynthia Murrell, October 19, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Tweet Gross Domestic Product Tool

October 16, 2015

Twitter can be used to figure out your personal income.  Twitter was not designed to be a tool to tally a person’s financial wealth, instead it is a communication tool based on a one hundred forty character messages to generate for small, concise delivery.  Twitter can be used to chat with friends, stars, business executives, etc, follow news trends, and even advertise products by sent to a tailored audience.  According to Red Orbit in the article “People Can Guess Your Income Based On Your Tweets,” Twitter has another application.

Other research done on Twitter has revealed that your age, location, political preferences, and disposition to insomnia, but your tweet history also reveals your income.  Apparently, if you tweet less, you make more money.  The controls and variables for the experiment were discussed, including that 5,191 Twitter accounts with over ten million tweets were analyzed and accounts with a user’s identifiable profession were used.

Users with a high follower and following ratio had the most income and they tended to post the least.  Posting throughout the day and cursing indicated a user with a lower income.  The content of tweets also displayed a plethora of “wealth” information:

“It isn’t just the topics of your tweets that’s giving you away either. Researchers found that “users with higher income post less emotional (positive and negative) but more neutral content, exhibiting more anger and fear, but less surprise, sadness and disgust.” It was also apparent that those who swore more frequently in their tweets had lower income.”

Twitter uses the information to tailor ads for users, if you share neutral posts get targeted ads advertising expensive items, while the cursers get less expensive ad campaigns.  The study also proves that it is important to monitor your Twitter profile, so you are posting the best side of yourself rather than shooting yourself in the foot.

Whitney Grace, October 16, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Sell Your Soul for a next to Nothing on the Dark Web

October 13, 2015

The article on ZDNet titled The Price of Your Identity in the Dark Web? No More Than a Dollar provides the startlingly cheap value of stolen data on the Dark Web. We have gotten used to hearing about data breaches at companies that we know and use (ahem, Ashley Madison), but what happens next? The article explains,

“Burrowing into the Dark Web — a small area of the Deep Web which is not accessible unless via the Tor Onion network — stolen data for sale is easy to find. Accounts belonging to US mobile operators can be purchased for as little as $14 each, while compromised eBay, PayPal, Facebook, Netflix, Amazon and Uber accounts are also for sale. PayPal and eBay accounts which have a few months or years of transaction history can be sold for up to $300 each.”

According to the  Privacy Rights Clearinghouse the most common industries affected by data breaches are healthcare, government, retail, and education sectors. But it also stresses that a high number of data breaches are not caused by hackers or malicious persons at all. Instead, unintended disclosure is often the culprit. Dishearteningly, there is really no way to escape being a target besides living out some Ron Swanson off the grid fantasy scenario. Every organization that collects personal information is a potential breach target. It is up to the organizations to protect the information, and while many are making that a top priority, most have a long way to go.

Chelsea Kerwin, October 13, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

CFO Ruth Porat Leads Transparency Directive at Alphabet Google

October 12, 2015

The article titled Google Opens Up to Wall Street on The Wall Street Journal describes the transparency efforts ramping up at Google under the direction of new CFO Ruth Porat. It seems that as risks go up for the “Alphabet” Google thing, the company wants to be more transparent to the Wall Street crowd.

“The new approach has contributed to recent gains in Google shares, Mr. Mahaney said. Google shares are up about 15% in the past three months, while the tech-heavy Nasdaq Composite Index has dropped about 8%. Google still doesn’t offer revenue or earnings forecasts, as many companies do. But Ms. Porat is trying to provide insight to help investors better understand how Google runs its business and help analysts more easily build financial models. A Google spokesman declined to comment.”

The most impactful initiative the article discusses is “Office Hours,” or analyst and investor briefings wherein Google speaks to public information that will effect expenses, such as the seasonal hiring of recent college graduates. Investor and analyst briefings of this sort are common at most companies, although they skirt securities regulations. As long as Google only discusses already publicly disclosed information in the sessions they are safe.

Chelsea Kerwin, October 12, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Legacy Servers: Upgrade Excitement

October 2, 2015

Enterprise management systems (ECM) were supposed to provide an end all solution for storing and organizing digital data.  Data needs to be stored for several purposes: taxes, historical record, research, and audits.  Government agencies deployed ECM solutions to manage their huge data loads, but the old information silos are not performing up to modern standards.  GCN discusses government agencies face upgrading their systems in “Migrating Your Legacy ECM Solution.”

When ECMs first came online, information was stored in silos programmed to support even older legacy solutions with niche applications.  The repositories are so convoluted that users cannot find any information and do not even mention upgrading the beasts:

“Aging ECM systems are incapable of fitting into the new world of consumer-friendly software that both employees and citizens expect.  Yet, modernizing legacy systems raises issues of security, cost, governance and complexity of business rules  — all obstacles to a smooth transition.  Further, legacy systems simply cannot keep up with the demands of today’s dynamic workforce.”

Two solutions present themselves: data can be moved from an old legacy system to a new one or simply moving the content from the silo.  The barriers are cost and time, but the users will reap the benefits of upgrades, especially connectivity, cloud, mobile, and social features.  There is the possibility of leaving the content in place using interoperability standards or cloud-based management to make the data searchable and accessible.

The biggest problem is actually convincing people to upgrade.  Why fix what is not broken?  Then there is the justification of using taxpayers’ money for the upgrade when the money can be used elsewhere.  Round and round the argument goes.

Whitney Grace, October 2, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Not Hacking, but Trickery, Lost Bitpay Almost $2 Million

September 30, 2015

The article titled How a Clever Hacker Tricked a Major Bitcoin Company Out of $1.8 Million on Motherboard shines a light on the manipulation of BitPay,a Bitcoin payment service, by a clever hacker. Apparently the attacker sent an email from BTC Media CEO David Bailey’s computer to a BitPay CFO requesting his corporate email information, which he readily supplied because the two companies were already in talks about a potential partnership. The article clarifies,

“The insurance claim on the lost funds was denied because BitPay’s computers were never hacked—instead, they just gave away their email passwords in what appears to be a classic phishing scam. Phishing is when an attacker send a scammy email in the hopes that the victim is not savvy enough to trash it immediately. …Several months after the hack, BitPay was reportedly processing more than $1 million in payments every day.”

The hacker continued using Bitpay’s executive accounts to request funds, all of which were apparently granted until an employee of the transaction software company, SecondMarket, was notified. The article and court case emphasize that this was not a hacking scenario, just a $1.8 Million phishing scam that people using Craigslist for job searches avoid every day.
Chelsea Kerwin, September 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta