Machine Learning Changes the Way We Learn from Data
October 26, 2016
The technology blog post from Danial Miessler titled Machine Learning is the New Statistics strives to convey a sense of how crucial Machine Learning has become in terms of how we gather information about the world around us. Rather than dismissing Machine Learning as a buzzword, the author heralds Machine Learning as an advancement in our ability to engage with the world around us. The article states,
So Machine Learning is not merely a new trick, a trend, or even a milestone. It’s not like the next gadget, instant messaging, or smartphones, or even the move to mobile. It’s nothing less than a foundational upgrade to our ability to learn about the world, which applies to nearly everything else we care about. Statistics greatly magnified our ability to do that, and Machine Learning will take us even further.
The article breaks down the steps of our ability to analyze our own reality, moving from randomly explaining events, to explanations based on the past, to explanations based on comparisons with numerous trends and metadata. The article positions Machine Learning as the next step, involving an explanation that compares events but simultaneously progresses the comparison by coming up with new models. The difference is of course that Machine Learning offers the ability of continuous model improvement. If you are interested, the blog also offers a Machine Learning Primer.
Chelsea Kerwin, October 26, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Partnership Aims to Establish AI Conventions
October 24, 2016
Artificial intelligence research has been booming, and it is easy to see why— recent advances in the field have opened some exciting possibilities, both for business and society as a whole. Still, it is important to proceed carefully, given the potential dangers of relying too much on the judgement of algorithms. The Philadelphia Inquirer reports on a joint effort to develop some AI principles and best practices in its article, “Why This AI Partnership Could Bring Profits to These Tech Titans.” Writer Chiradeep BasuMallick explains:
Given this backdrop, the grandly named Partnership on AI to Benefit People and Society is a bold move by Alphabet, Facebook, IBM and Microsoft. These globally revered companies are literally creating a technology Justice League on a quest to shape public/government opinion on AI and to push for friendly policies regarding its application and general audience acceptability. And it should reward investors along the way.
The job at hand is very simple: Create a wave of goodwill for AI, talk about the best practices and then indirectly push for change. Remember, global laws are still obscure when it comes to AI and its impact.
Curiously enough, this elite team is missing two major heavyweights. Apple and Tesla Motors are notably absent. Apple Chief Executive Tim Cook, always secretive about AI work, though we know about the estimated $200 million Turi project, is probably waiting for a more opportune moment. And Elon Musk, co-founder, chief executive and product architect of Tesla Motors, has his own platform to promote technology, called OpenAI.
Along with representatives of each participating company, the partnership also includes some independent experts in the AI field. To say that technology is advancing faster than the law can keep up with is a vast understatement. This ongoing imbalance underscores the urgency of this group’s mission to develop best practices for companies and recommendations for legislators. Their work could do a lot to shape the future of AI and, by extension, society itself. Stay tuned.
Cynthia Murrell, October 24, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Half of the Largest Companies: Threat Vulnerable
October 24, 2016
Compromised Credentials, a research report by Digital Shadows reveals that around 1,000 companies comprising of Forbes Global 2000 are at risk as credentials of their employees are leaked or compromised.
As reported by Channel EMEA in Digital Shadows Global Study Reveals UAE Tops List in Middle East for…
The report found that 97 percent of those 1000 of the Forbes Global 2000 companies, spanning all businesses sectors and geographical regions, had leaked credentials publicly available online, many of them from third-party breaches.
Owing to large-scale data breaches in recent times, credentials of 5.5 million employees are available in public domain for anyone to see. Social networks like LinkedIN, MySpace and Tumblr were the affliction points of these breaches, the report states.
Analyzed geographically, companies in Middle-East seem to be the most affected:
The report revealed that the most affected country in the Middle East – with over 15,000 leaked credentials was the UAE. Saudi Arabia (3360), Kuwait (203) followed by Qatar (99) made up the rest of the list. This figure is relatively small as compared to the global figure due to the lower percentage of organizations that reside in the Middle East.
Affected organizations may not be able to contain the damages by simply resetting the passwords of the employees. It also needs to be seen if the information available is contemporary, not reposted and is unique. Moreover, mere password resetting can cause lot of friction within the IT departments of the organizations.
Without proper analysis, it will be difficult for the affected companies to gauge the extent of the damage. But considering the PR nightmare it leads to, will these companies come forward and acknowledge the breaches?
Vishal Ingole, October 24, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Sugar Polluted Scientific Research
October 19, 2016
If your diet includes too much sugar, it is a good idea to cut back on the amount you consume. If also turns out if you have too much sugar in your research, the sugar industry will bribe you to hide the facts. Stat News reports that even objective academic research is not immune from corporate bribes in the article, “Sugar Industry Secretly Paid For Favorable Harvard Research.”
In the 1960s, Harvard nutritionists published two reviews in medical journals that downplayed the role sugar played in coronary heart disease. The sugar industry paid Harvard to report favorable results in scientific studies. Dr. Cristin Kearns published a paper in JAMA Internal Medicine about her research into the Harvard sugar conspiracy.
Through her research, she discovered that Harvard nutrionists Dr. Fredrick Stare and Mark Hegsted worked with the Sugar Research Foundation to write a literature review that countered early research that linked sucrose to coronary heart disease. This research would later help the sugar industry increase its market share by convincing Americans to eat a low-fat diet.
Dr. Walter Willett, who knew Hegsted and now runs the nutrition department at Harvard’s public health school, defended him as a principled scientist…‘However, by taking industry funding for the review, and having regular communications during the review with the sugar industry,’ Willett acknowledged, it ‘put him [Hegsted] in a position where his conclusions could be questioned. It is also possible that these relationships could induce some subtle bias, even if unconscious,’ he added.
In other words, corporate funded research can skew scientific data so that it favors their bottom dollar. This fiasco happened in the 1960s, have things gotten worse or better? With the big competition for funding and space in scientific journals, the answer appears to be yes.
Whitney Grace, October 19, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Malware with Community on the Dark Web
October 14, 2016
While Mac malware is perhaps less common than attacks designed for PC, it is not entirely absent. The Register covers this in a recent article, EasyDoc malware adds Tor backdoor to Macs for botnet control. The malware is disguised as a software application called EasyDoc Converter which is supposed to be a file converter but does not actually perform that function. Instead, it allows hackers to control the hacked mac via Tor. The details of the software are explained as follows,
The malware, dubbed Backdoor.MAC.Eleanor, sets up a hidden Tor service and PHP-capable web server on the infected computer, generating a .onion domain that the attacker can use to connect to the Mac and control it. Once installed, the malware grants full access to the file system and can run scripts given to it by its masters. Eleanor’s controllers also uses the open-source tool wacaw to take control of the infected computer’s camera. That would allow them to not only spy on the victim but also take photographs of them, opening up the possibility of blackmail.
A Computer World article on EasyDoc expands on an additional aspect of this enabled by the Dark Web. Namely, there is a Pastebin agent which takes the infected system’s .onion URL, encrypts it with an RSA public key and posts it on Pastebin where attackers can find it and use it. This certainly seems to point to the strengthening of hacking culture and community, as counterintuitive of a form of community, it may be to those on the outside.
Megan Feil, October 14, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
National Geographic Quad View
October 13, 2016
Google Maps and other map tools each have their unique features, but some are better than others at helping you find your way. However, most of these online map tools have the same basic function and information. While they can help you if you are lost, they are not that useful for topography. National Geographic comes to our rescue with free topographic PDFs. Check them out at PDF Quads.
Here are the details straight from the famous nature magazine:
National Geographic has built an easy to use web interface that allows anyone to quickly find any quad in the country for downloading and printing. Each quad has been pre-processed to print on a standard home, letter size printer. These are the same quads that were printed by USGS for decades on giant bus-sized pressed but are now available in multi-page PDFs that can be printed just about anywhere. They are pre-packaged using the standard 7.5 minute, 1:24,000 base but with some twists.
How can there be twists in a topographic map? They are not really that surprising, just explanations about how the images are printed out. Page one is an overview map that, pages two through five are standard topographic maps sized to print on regular paper, and hill shading is added to provide the maps with more detail.
Everyone does not use topography maps, but a precise tool is invaluable to those who do.
Whitney Grace, October 13, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Labor Shortage of Cyber Security Professionals
October 13, 2016
It’s no surprise that hackers may be any age, but that teenagers could cause 60 million pounds worth of damage to a corporation is newsworthy, regardless of age. The Telegraph published an article, From GCHQ to Google: the battle to outpace hackers in the cyber race, reporting on this. A 15-year-old boy hacked the TalkTalk computer network stole personal data, including financial information, of 157,000 customers. This comes at a time when the UK government announced plans to invest £1.9 billion in cyber security over the next five years. We also learned,
No amount of money will help overcome one of the greatest difficulties in the security industry though: the lack of skilled people. By 2019 there will be a global shortfall of 1.5 million security professionals, according to ISC Squared, a security certification and industry education body. And the numbers could in fact be significantly higher, given that there are already more than 1 million cybersecurity positions unfilled worldwide, according to a 2015 Cisco report. Heading up the government’s move to train more cyber defenders is spook agency GCHQ, which sponsors academic bursaries, runs summer camps and training days, holds competitions and has created a cyber excellence accreditation for top universities and masters programmes. The intention is to spot talent in children and nurture them through their education, with the end goal being a career in the industry.
The problem of for any rocketing industry ready to blast off always seems to boil down to people. We have seen it with big data in all of it’s forms from electronic medical records to business analytics to cyber security. It seems industry is most fertile when people and technology work best stride-by-stride.
Megan Feil, October 13, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Explain Cloud Analytics Like I Am Five
October 10, 2016
One of Reddit’s popular subreddits is “explain to me like I’m five,” where redditors post questions they have about science, math, computing, engineering, politics, and other topics. Outside of reading textbooks or questioning experts in person, this subreddit allows intellectual discussion on a global basis…as long as the comments remain mature. “Explain to me like I’m five” is like the favorite For Dummies book series.
While Internet forums and Reddit itself have made the series semi-obsolete, For Dummies books are still a reliable reference tool when you don’t want to search and scroll on the Internet. As companies move towards cloud-based systems, you can be sure there will be a slew of cloud computing For Dummies books.
Open Source Magazine shares that “Analytics For Dummies” is available for a free download!
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.
For Dummies books usually retail around twenty dollars, so this offers the chance for a free, updated manual on the growing cloud analytics field and you can save a few dollars.
Whitney Grace, October 10, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Image-Based Search Technology Gains Steam
October 10, 2016
If you need to do a bit of smartphone photos clean-up, now is a good time. More websites are integrating photo-based search technologies according to Pinterest Will Let You Snap Photos To Find Real-Life Products Online. This piece from Forbes explains camera search will be available in the coming months and will allow users to snap a photo of, for example, a purse they see someone else carrying down the street, and find similar products on Pinterest. They’re calling these products “buyable pins”. According to the article,
Users make 130 million visual searches on Pinterest per month and about 2 billion total searches. Now, more than 10 million products can be purchased without leaving Pinterest from more than 20,000 retailers, up from 2 million products when “buyable pins” launched about a year ago. When a user sees a product on Pinterest, they are two times more likely to buy it in-store. And if a merchant promotes the pin, users are five times more likely to buy the item in person, the company said. In testing “buyable pins,” Pinterest said a third of purchases made on the web were first discovered on mobile. More than 80% of users access Pinterest on mobile devices.
Some applications for this search technology, may not be well-poised to monetize this, but according to a survey cited in the article 55 percent of respondents already consider Pinterest as e-commerce. Currently, the platform sees itself as a “bridge between inspiration and making it part of your real life.” This is essentially the role of any brick-and-mortar shop amenable to window-shopping. So, while it may work, we certainly can’t say the strategy is new.
Megan Feil, October 10, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Business Intelligence Take on the Direction of Media
October 7, 2016
The article on Business Insider titled The Top 7 Predictions For the Future of Media offers a long gaze into the crystal ball. With significant research over the past six years including interviews with key industry players, the article posits that the future is clear for those willing to sit through the IGNITION Conference presentation put together by BI’s co-founder and CEO Henry Blodget. The article sums up the current state of uncertainty in media,
Users are moving away from desktop and toward mobile. Social media referrals are overtaking search. Consumers are cutting their cords and saying goodbye to traditional pay-TV. Messaging apps are threatening email. And smart devices are starting to connect everything around us. These changes in trends can disrupt our businesses, our portfolios, and even our lives. But they don’t have to…Those who are well informed and well prepared don’t see innovation as a threat; they see it as an opportunity.
The article overviews some of the major takeaways from the presentation such as: Newspapers will soon be joined by TV networks in their frustrating battle for relevance. The article also mentions that the much-discussed ad blocking crisis will “resolve itself,” with the caustic note that we should all be “careful what [we] wish for.” Not much interest in finding information however. The full report is available through BI for free after signing up.
Chelsea Kerwin, October 7, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph