Lexmark, a Printer Supply Company, Receives Hold Rating from Analysts
October 20, 2015
The article on Dakota Financial News titled Lexmark International Given Average Recommendation of “Hold” by Brokerages (NYSE: LXK) piles on the bad news for Lexmark, a company best known for its printer supply services. It is a tough time to be in the printing business, and Lexmark has received numerous analyst ratings of “Hold” and “Sell.” The article details the trend,
“Lexmark International (NYSE:LXK) traded down 0.59% during trading on Wednesday, hitting $28.59. The company had a trading volume of 259,296 shares. Lexmark International has a one year low of $27.22 and a one year high of $47.69. The stock has a 50-day moving average of $30.27 and a 200 day moving average of $39.70. The company’s market capitalization is $1.76 billion…The company reported $0.97 earnings per share (EPS) for the quarter, beating analysts’ consensus estimates of $0.85 by $0.12. “
Certainly not a vote of confidence in Lexmark, which owns both Brainware and ISYS Search Software. The article goes into some detail about the companies other work beyond printer supplies including enterprise content and process management software and healthcare archive with integration abilities for unstructured patient information. Perhaps these extras are saving the company from falling entirely into the “sell” category and maintaining at “Hold.”
Chelsea Kerwin, October 20, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Bye-Bye Enterprise Storage
October 19, 2015
Storage is a main component of the enterprise system. Silos store data and eventually the entire structure transforms into a legacy system, but BusinessWire says in “MapR Extends Support For SAS To Deliver Big Data Storage Independence” it is time to say good-bye to old enterprise storage. MapR is trying to make enterprise storage obsolete with its new extended service support for SAS, a provider of business software and services. The new partnership between allows advanced analytics with easy data preparation and integration in legacy systems, improved security, data compliance, and assurance of service level agreements.
The entire goal is to allow SAS and MapR clients to have better flexibility for advanced analytics within Hadoop as well as to help customers harvest the most usefulness our of their data.
Here is a rundown of the partnership between SAS and MapR:
“The collaboration makes available the full scope of technologies in the SAS portfolio, including SAS® LASR™ Analytic Server, SAS Visual Analytics, SAS High-Performance Analytics, and SAS Data Loader for Hadoop. Complete MapR integration delivers security and full POSIX compliance for use in “share everything architectures,” as well as enables SAS Visual Analytics to easily and securely access all data. With SAS Data Loader for Hadoop, users can prepare, cleanse and integrate data inside MapR for improved performance and then load that data in-memory into SAS LASR for visualization or analysis, all without writing code.”
Breaking away from legacy systems with old onsite storage is one of the new trends for enterprise systems. Legacy systems are clunky, don’t necessary comply with new technology, and have slow information retrieval. A new enterprise system using SAS and MapR’s software will last for some time, until the new trend buzzes through town.
Whitney Grace, October 19, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Coveo Touts Secure, Intelligent Cloud Search
October 19, 2015
Security is a perpetual concern, especially for those who work in the cloud. Enterprise search firm Coveo want us to know they take security very seriously. Their press release, “Coveo Completes Security Evaluation for cloud-Based Intelligent Search Offerings,” is posted at MarketWatch. The question is, “What does secure mean?” The definition may depend on one’s knowledge of the exploit world.
The write-up states:
“Marking its commitment to be the most secure intelligent search provider in the marketplace, Coveo announced that it has completed a comprehensive evaluation of data security and compliance procedures and processes. Coveo engaged with Brightline CPAs & Associates, which conducted a series of tests to evaluate the effectiveness of operations and controls that address data integrity and security. With data security threats on the rise across various industries and around the world, Coveo recognizes how important it is to provide clients of its cloud, intelligent search offerings with the highest security standards. Over the years, Coveo has implemented a set of industry-standard operations, infrastructure and services to ensure the integrity and privacy of customer data, including:
— SOC II and SOC I examinations
— Strong logical and physical access controls
— Systematic application and source code scanning
— Comprehensive background checks on all employees
— 24/7/365 live, dedicated operations and security teams
— Formal, ongoing 3rd party compliance and security reviews”
We are reminded that Coveo was recently named “most innovative leader” for the second year running in the Gartner Enterprise Search Magic Quadrant, with that report lauding the company’s “unusually rich security functions.” Founded in 2005, Coveo maintains offices in the U.S. (SanMateo, CA), the Netherlands, and Quebec.
Cynthia Murrell, October 19, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Tweet Gross Domestic Product Tool
October 16, 2015
Twitter can be used to figure out your personal income. Twitter was not designed to be a tool to tally a person’s financial wealth, instead it is a communication tool based on a one hundred forty character messages to generate for small, concise delivery. Twitter can be used to chat with friends, stars, business executives, etc, follow news trends, and even advertise products by sent to a tailored audience. According to Red Orbit in the article “People Can Guess Your Income Based On Your Tweets,” Twitter has another application.
Other research done on Twitter has revealed that your age, location, political preferences, and disposition to insomnia, but your tweet history also reveals your income. Apparently, if you tweet less, you make more money. The controls and variables for the experiment were discussed, including that 5,191 Twitter accounts with over ten million tweets were analyzed and accounts with a user’s identifiable profession were used.
Users with a high follower and following ratio had the most income and they tended to post the least. Posting throughout the day and cursing indicated a user with a lower income. The content of tweets also displayed a plethora of “wealth” information:
“It isn’t just the topics of your tweets that’s giving you away either. Researchers found that “users with higher income post less emotional (positive and negative) but more neutral content, exhibiting more anger and fear, but less surprise, sadness and disgust.” It was also apparent that those who swore more frequently in their tweets had lower income.”
Twitter uses the information to tailor ads for users, if you share neutral posts get targeted ads advertising expensive items, while the cursers get less expensive ad campaigns. The study also proves that it is important to monitor your Twitter profile, so you are posting the best side of yourself rather than shooting yourself in the foot.
Whitney Grace, October 16, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Sell Your Soul for a next to Nothing on the Dark Web
October 13, 2015
The article on ZDNet titled The Price of Your Identity in the Dark Web? No More Than a Dollar provides the startlingly cheap value of stolen data on the Dark Web. We have gotten used to hearing about data breaches at companies that we know and use (ahem, Ashley Madison), but what happens next? The article explains,
“Burrowing into the Dark Web — a small area of the Deep Web which is not accessible unless via the Tor Onion network — stolen data for sale is easy to find. Accounts belonging to US mobile operators can be purchased for as little as $14 each, while compromised eBay, PayPal, Facebook, Netflix, Amazon and Uber accounts are also for sale. PayPal and eBay accounts which have a few months or years of transaction history can be sold for up to $300 each.”
According to the Privacy Rights Clearinghouse the most common industries affected by data breaches are healthcare, government, retail, and education sectors. But it also stresses that a high number of data breaches are not caused by hackers or malicious persons at all. Instead, unintended disclosure is often the culprit. Dishearteningly, there is really no way to escape being a target besides living out some Ron Swanson off the grid fantasy scenario. Every organization that collects personal information is a potential breach target. It is up to the organizations to protect the information, and while many are making that a top priority, most have a long way to go.
Chelsea Kerwin, October 13, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
CFO Ruth Porat Leads Transparency Directive at Alphabet Google
October 12, 2015
The article titled Google Opens Up to Wall Street on The Wall Street Journal describes the transparency efforts ramping up at Google under the direction of new CFO Ruth Porat. It seems that as risks go up for the “Alphabet” Google thing, the company wants to be more transparent to the Wall Street crowd.
“The new approach has contributed to recent gains in Google shares, Mr. Mahaney said. Google shares are up about 15% in the past three months, while the tech-heavy Nasdaq Composite Index has dropped about 8%. Google still doesn’t offer revenue or earnings forecasts, as many companies do. But Ms. Porat is trying to provide insight to help investors better understand how Google runs its business and help analysts more easily build financial models. A Google spokesman declined to comment.”
The most impactful initiative the article discusses is “Office Hours,” or analyst and investor briefings wherein Google speaks to public information that will effect expenses, such as the seasonal hiring of recent college graduates. Investor and analyst briefings of this sort are common at most companies, although they skirt securities regulations. As long as Google only discusses already publicly disclosed information in the sessions they are safe.
Chelsea Kerwin, October 12, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Legacy Servers: Upgrade Excitement
October 2, 2015
Enterprise management systems (ECM) were supposed to provide an end all solution for storing and organizing digital data. Data needs to be stored for several purposes: taxes, historical record, research, and audits. Government agencies deployed ECM solutions to manage their huge data loads, but the old information silos are not performing up to modern standards. GCN discusses government agencies face upgrading their systems in “Migrating Your Legacy ECM Solution.”
When ECMs first came online, information was stored in silos programmed to support even older legacy solutions with niche applications. The repositories are so convoluted that users cannot find any information and do not even mention upgrading the beasts:
“Aging ECM systems are incapable of fitting into the new world of consumer-friendly software that both employees and citizens expect. Yet, modernizing legacy systems raises issues of security, cost, governance and complexity of business rules — all obstacles to a smooth transition. Further, legacy systems simply cannot keep up with the demands of today’s dynamic workforce.”
Two solutions present themselves: data can be moved from an old legacy system to a new one or simply moving the content from the silo. The barriers are cost and time, but the users will reap the benefits of upgrades, especially connectivity, cloud, mobile, and social features. There is the possibility of leaving the content in place using interoperability standards or cloud-based management to make the data searchable and accessible.
The biggest problem is actually convincing people to upgrade. Why fix what is not broken? Then there is the justification of using taxpayers’ money for the upgrade when the money can be used elsewhere. Round and round the argument goes.
Whitney Grace, October 2, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Not Hacking, but Trickery, Lost Bitpay Almost $2 Million
September 30, 2015
The article titled How a Clever Hacker Tricked a Major Bitcoin Company Out of $1.8 Million on Motherboard shines a light on the manipulation of BitPay,a Bitcoin payment service, by a clever hacker. Apparently the attacker sent an email from BTC Media CEO David Bailey’s computer to a BitPay CFO requesting his corporate email information, which he readily supplied because the two companies were already in talks about a potential partnership. The article clarifies,
“The insurance claim on the lost funds was denied because BitPay’s computers were never hacked—instead, they just gave away their email passwords in what appears to be a classic phishing scam. Phishing is when an attacker send a scammy email in the hopes that the victim is not savvy enough to trash it immediately. …Several months after the hack, BitPay was reportedly processing more than $1 million in payments every day.”
The hacker continued using Bitpay’s executive accounts to request funds, all of which were apparently granted until an employee of the transaction software company, SecondMarket, was notified. The article and court case emphasize that this was not a hacking scenario, just a $1.8 Million phishing scam that people using Craigslist for job searches avoid every day.
Chelsea Kerwin, September 30, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
National Geographic Sells Out
September 30, 2015
The National Geographic Society is one of the most respected institutes in regards to science and journalism related to nature. For 127 years, National Geographic managed itself as a non-profit organization. Buzzfeed reports that 21st Century Fox purchased National Geographic in the article, “Rupert Murdoch Is Buying National Geographic.” Before you start getting upset that National Geographic has “sold out” in the same manner that Sesame Street has a new partnership with HBO, be aware that 21st Century Fox already owned and operated a joint-venture partnership with the company.
The bulk of National Geographic’s properties are being turned over to 21st Century Fox, who will manage them and allow the National Geographic Society to focus on:
“The National Geographic Society said the deal will let the foundation invest more money in sponsoring explorers and scientists. ‘The value generated by this transaction, including the consistent and attractive revenue stream that National Geographic Partners will deliver, ensures that we will have greater resources for this work, which includes our grant making programs,’ said CEO Gary Knell, in a statement.”
While National Geographic is still popular, it faces stiff competition from other news outlets that generate similar if not more content. National Geographic wants to have better, modern storytelling “so that we may all know more of the world upon which we live.”
Hopefully this will free up more monies for scientific research, endeavors to protect endangered species, educational programs, and better ways to educate people on the natural world.
Whitney Grace, September 30, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Many Applications of Predictive Analytics
September 29, 2015
The article on Computer World titled Technology that Predicts Your Next Security Fail confers the current explosion in predictive analytics, the application of past occurrences to predict future occurrences. The article cites the example of the Kentucky Department of Revenue (DOR), which used predictive analytics to catch fraud. By providing SAS with six years of data the DOR received a batch of new insights into fraud indicators such as similar filings from the same IP address. The article imparts words of wisdom from SANS Institute instructor Phil Hagen,
“Even the most sophisticated predictive analytics software requires human talent, though. For instance, once the Kentucky DOR tools (either the existing checklist or the SAS tool) suspect fraud, the tax return is forwarded to a human examiner for review. “Predictive analytics is only as good as the forethought you put into it and the questions you ask of it,” Hagen warns…. Also It’s imperative that data scientists, not security teams, drive the predictive analytics project.”
In addition to helping the IRS avoid major fails like the 2013 fraudulent refunds totaling $5.8 billion, predictive analytics has other applications. Perhaps most interesting is its use protecting human assets in regions where kidnappings are common by detecting unrest and alerting organizations to lock up their doors. But it is hard to see limitations for technology that so accurately reads the future.
Chelsea Kerwin, September 29, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph