Google: No More Never Complain, Never Explain
October 23, 2010
The Straits Times reported “Google Sorry for Lapses.” Is this a change in method? I recall learning from one of my college professors at the cow town school to which I was admitted, “Never complain, never explain.” Now Google is apologizing, which combines complaining and explaining. If the write up is accurate, the Google may now be recognizing that it has created the equivalent of a ceramic brake slowing the Googlemobile to a snail’s pace. For a Googzilla, getting smoked by a snail is painful indeed. I opine that such friction may be worse than sitting out the senior prom in high school to work on a problem in partial derivatives.
Here’s the passage that caught my attention:
Mr Eustace [Google wizard and adult in charge of rocket science] provided Google’s most detailed description yet of the private data on unsecured wireless networks scooped up by Street View cars as they cruised through cities around the world taking pictures. ‘While most of the data is fragmentary, in some instances entire emails and URLs were captured, as well as passwords,’ he said. ‘We want to delete this data as soon as possible, and I would like to apologize again for the fact that we collected it in the first place. ‘We are mortified by what happened, but confident that these changes to our processes and structure will significantly improve our internal privacy and security practices for the benefit of all our users,’ Mr Eustace said.
Several observations:
- What about that phrase “most of the data is fragmentary”? “Data” is a plural but that matters not to the Google. The “most”? Well, that is more problematic and apparently ambiguous.
- With so many smart lads and lasses, how can such a mistake get propagated across the years and multiple versions of the scampering little data gobbling vehicles? Interesting to me, but I am not mortified. Google is. Ooops.
- After 12 years, a couple of alleged stalkers, and an Odwalla beverage delivery truck full of legal hassles, the Google is fixing up its “internal privacy and security practices.” I do like the categorical affirmative. Too bad the multiple exceptions create a bit of a logical issue for this goose.
In short, complaining and explaining perhaps?
Stephen E Arnold, October 23, 2010
Freebie
Access to Search Outside the US
September 23, 2010
This is not specifically about “beyond search”. The article is about “actually searching.” If you are in certain countries, access to mostly unfiltered Web sites can be tricky.
If you want to access all that you couldn’t for various reasons, then there’s LifeHacker.com’s “Top 10 Ways to Access Blocked Stuff on The Web.” It offers tips like getting quickie user/pass combo you can use to log in on just about every site on the net, or tricks to work-around with the browser’s user agent, for checking out Gmail’s new iPad interface on anything but iPad.
The site suggests the old trick of copying and pasting the URL onto Google for the blocked pages, ways to access Gmail when it is down, or how to always get BitTorrent speeds, and access sites taken down by traffic. You also learn to remote control computers, access country-blocked streaming TV, and roll your own proxy to access blocked sites by using PHProxy on the local web server setup on your computer. We find the site information a valuable reference, quite handy for searching information in certain countries.
Our suggestion: download and keep handy if you travel far and wide. We are not advocating any action that would violate a rule, law, regulation, or custom. Information, however, is often just darned useful for its own sake.
Harleena Singh, September 23, 2010
Freebie
i2, Inc. and Palantir
September 19, 2010
In a motion filed Monday Aug. 9, 2010, i2 filed a complaint explained in “Media Advisory from i2.” The plaintiff, www.i2.co.uk, makes allegations related to i2’s intellectual property. You can access the legal documents via Scribd. i2 and Palantir are involved in content processing, data management, and various analytics processes. More about i2 is here. More about Palantir is here. Years ago I did some work for i2 and learned that the firm’s technologies were widely used in intelligence, law enforcement, and related market sectors. Palantir is more of a newcomer. Palantir received an infusion of venture funding in 2010.
Stephen E Arnold, September 19, 2010
Freebie
Another Google Issue
September 19, 2010
Short honk: I don’t have much to say about this series of news stories and their write ups. I thought Google’s Summer of Anguish was over. Guess not. Why? Check out these titles. You may want to read the stories, but I just skimmed them:
- Google Engineer Fired for Spying on Teenagers
- Ex-Googler Allegedly Spied on User E-Mails, Chats
- Google Fires Engineer for Privacy Breach
Not even a gentle honk from Harrod’s Creek. Maybe this will be an endless summer for the Google?
Stephen E Arnold, September 19, 2010
Freebie
Are Google and IBM Disagreeing about Security?
September 3, 2010
Google and IBM have some ties; for example, the effort to get certain “big data” programming skills injected into computer science programs. However, I noted an article on ITProPortal that contained a hint of possible discord. Point your brower to “Google Not Happy with IBM Security Report.” The blog reported that Google “dismissed the security statistics cited by IT services giant IBM and has challenged the accuracy of the report.” You can see Google’s statement in “Vulnerability Trends: How Are Companies Really Doing?” In this Google blog post, Google said:
the data behind these [industry security] reports is commonly inaccurate or outdated to some degree. The truth is that maintaining an accurate and reliable database of this type of information is a significant challenge. We most recently saw this reality play out last week after the appearance of the IBM X-Force® 2010 Mid-Year Trend and Risk Report. We questioned a number of surprising findings concerning Google’s vulnerability rate and response record, and after discussions with IBM, we discovered a number of errors that had important implications for the report’s conclusions. IBM worked together with us and promptly issued a correction to address the inaccuracies.
Minor ripple? Probably. Enterprise security is a key concern in organizations. With Google’s stepped up efforts in its enterprise unit, one would expect Google to take a strong stance.
Stephen E Arnold, September 3, 2010
Freebie
ChaCha and KGB: Seeing Eye to Eye
August 23, 2010
Who offers the most trusted search system for the Web and mobile. Is Google still the most trusted “go to” Internet search engine and with the advancement of mobile technology many mobile users can now conduct Google search from their mobile device.
“ChaCha, KGB See Text Messages as Alternative to Search Engines on Cell Phones” the companies ChaCha and KGB offer customers a simpler way to get answers. Users can send a question to ChaCha through a text or voice message and simply wait for a prompt reply from an agent. This is a free service but users should be prepared to receive advertisements from various providers. KGB service guides also can be contacted in a similar fashion except users must pay 99 cents and will not receive outside advertisements. Each is responsible for scouting out the latest information and delivering the most accurate up to date information possible. It’s not likely they are going to overtake Google fans but they could be a helpful addition.
Worth watching.
April Holmes, August 24, 2010
Database Security Model
August 8, 2010
I received a call on Friday, August 7, 2010, about a security model for a structured database. I told the caller I had to dig through my Overflight archives. The called said, “Can’t wait.” I did locate the document I recalled. You can get a copy of “SAIC TeraText DBS 4.3.13 Security Target” without charge from Common Criteria. The write up focuses on the TeraText data management and search system, but I have found the presentation, the diagrams, and the various bullet lists quite useful. So, for my really rushed, 20-something caller, I found the document that might provide a starting point. For the other two or three readers of this blog, attend or not.
Stephen E Arnold, August 8, 20100
Google Android, Froyo and Security
July 16, 2010
There have been reports that as many as 40,000 impatient hackers have gotten their Android updates a little early by going the hacker route. Presently, the only phone to get the proper update was the Nexus one. Google designed this one and take what you will from this bit of information, but it’s one of the worst selling phones.
So hackers with other versions decided to get theirs, according to a published report in tgdaily.com. Although the download site is no longer valid, it appears that up to 37,000 people clicked through the package.
If all this is true, these impatient android hackers getting Froyo brings up some interesting issues for Google. Privacy and security are important and Google needs to maintain their forward momentum here.
Rob Starr, July 16, 2010
Freebie
Expert System Honored
July 5, 2010
There were no teary-eyed speeches or red carpet interviews, but the business world recently awarded its version of the Oscar to a company doing exciting things with searches. The Stevie Awards annually select the best and brightest companies around the globe for its awards. This year was no exception, because its Best New Product or Service winner was search and semantic technology innovator Expert System USA () for its COGITO Focus program. This search platform improves search capabilities and interactive analysis for all data. “This allows users to have insight into both structured and unstructured content, both internally and externally, including RSS feeds, Web pages and social networks,” the company says. This honor is another sign that search companies are gaining significant traction and respect in the business world. A happy quack from the goose pond. In September 2010, ArnoldIT.com will feature the Expert System technology in its demonstration series. Watch the blog and the Expert System’s Web site for details.
Stephen E Arnold, July 5, 2010
India Wants to Tame Data Dervishes
July 4, 2010
Okay, a little 4th of July reality. Some high profile outfits get to demonstrate their plasticity. Which outfit will bend, break, or resist pressure best? Point your browser to “Reports: BlackBerry, Skype, Google Face India Data Demand.” If accurate, India wants to know who does what. Here’s the passage I noted:
Skype and the BlackBerry service could face a ban in India if they do not comply within 15 days, according to reports in The Economic Times, and The Hindu Business Line. A similar notice is also being sent to Google asking it to provide access to content on Gmail in a readable format.
My position is that companies are not nation states. If an organization wants to do business within national borders, those organizations have to follow the rules for that country.
I hear chatter about privacy and security. Interesting stuff, but if an organization breaks the rules within a nation state, I think one should keep in mind that nation states have police, intelligence agencies, and bureaucrats ready, willing and able to enforce the nation’s laws.
Laws are not consistent, clear, or even rational. Companies who operate above the law could be creating untenable situations for employees and contractors who happen to live, work, or visit within the boundaries of a nation state fed up with companies acting like superior entities. A year in prison might be just what’s needed to make the relative balance of power more understandable. What about having offices shuttered? What about not getting a broken sewer repaired? Odd things happen when countries get annoyed at companies and their executives.
Stephen E Arnold, July 4, 2010
Free sparkler