The Crowded Skies of Alphabet Google

December 2, 2015

I read “Google Is Ramping Up Hiring for Its Ambitious Plan to Make ‘Energy Kites’.” The idea is that energy kites will join Loon balloons in the sky. According to the write up:

Makani’s energy “kites” don’t resemble the type you see on beaches or in fields on windy days: They’re plane-like machines tethered to ground stations. Rotors on the kite launch it high into the air, where it then starts to rotate, driving an on-board generator to produce electricity, which moves down its tether to a grid below.

Interesting. What happens when Amazon drones fly through a Loon balloon serviced region where the Alphabet Google energy kites are aloft. Toss in some consumer drones, the efforts of various government contractors, and assorted birds. What happens? I do not know. Birds struggle with jet engines. How will the creatures adopt to energy kites? My hunch is that the answer may be, “Not a problem.” Right. Okay for humans. For the hapless white pileated woodpecker? Bad luck.

I much prefer the search and content processing thing. But that’s just my old fashioned view of a company with a core competence in information access.

Stephen E Arnold, December 2, 2015

Cybercrime to Come

December 2, 2015

Apparently, we haven’t seen anything yet. An article at Phys.org, “Kaspersky Boss Warns of Emerging Cybercrime Threats,” explain that personal devices and retail databases are just the beginning for cyber criminals. Their next focus has the potential to create more widespread chaos, according to comments from security expert Eugene Kaspersky. We learn:

“Russian online security specialist Eugene Kaspersky says cyber criminals will one day go for bigger targets than PCs and mobiles, sabotaging entire transport networks, electrical grids or financial systems. The online threat is growing fast with one in 20 computers running on Microsoft Windows already compromised, the founder and chief executive of security software company Kaspersky Lab told AFP this week on the sidelines of a cybersecurity conference in Monaco.”

The article also notes that hackers are constantly working to break every security advance, and that staying safe means more than installing the latest security software. Kaspersky noted:

“It’s like everyday life. If you just stay at home and if you don’t have visitors, you are quite safe. But if you like to walk around to any district of your city, you have to be aware of their street crimes. Same for the Internet.”

Kaspersky’s company, Kaspersky Lab, prides itself on its extensive knowledge of online security. Founded in 1997 and headquartered in Moscow, the company is one of the leading security firms in the world.

Cynthia Murrell, December 2, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Yandex Takes on Google with Anticompetitive Business Practices

November 30, 2015

Google is the dominate search engine in North America, South America, and Europe.  When it comes to Asia, however, Google faces stiff competition with Yahoo in Japan and Yandex in Russia.  Yandex has been able to hold a firm market share and remains stuff competition for Google.  Reuters says that “Russia’s Yandex Says Complained To EU Over Google’s Android” pointing to how Yandex might be able to one up its competition.

According to the article, Russia has petitioned the European Commission to investigate Google’s practices related to the Android mobile OS.  Yandex has been trying for a long time to dislodge Google’s attempts to gain a stronger market share in Europe and Asia.

“The new complaint could strengthen the case against Google, possibly giving enough ammunition to EU antitrust regulators to eventually charge the company with anti-competitive business practices, on top of accusations related to its Google Shopping service. The formal request was filed in April 2015 and largely mirrors the Russian company’s claims against the U.S. company in a Russian anti-monopoly case that Yandex won.”

The Russian competition watchdog discovered that Google is trying to gain an unfair advantage in the European and Asian search markets.  Yandex is one of the few companies who voices its dislike of Google along with Disconnect, Aptoide, and the FairSearch lobbying group.  Yandex wants the European Commission to restore balance to the market, so that fair competition can return.  Yandex is especially in favor of having mobile device users be able to select their search engine of choice, rather than having one preprogrammed into the OS.

It is interesting to view how competitive business practices take place over seas.  Usually in the United States whoever has the deepest pockets achieves market dominance, but the European Union is proving to uphold a fairer race for search dominance.  Even more interesting is that Google is complaining Yandex is trying to maintain its domiance with these complaints.

 
Whitney Grace, November 30, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Do Not Go Gently into That Dark Web

November 26, 2015

The article titled Don’t Toy With The Dark Web, Harness It on Infoworld’s DarkReading delves into some of the misconceptions about the Dark Web. The first point the article makes is that a great deal of threats to security occur on the surface web on such well-known sites as Reddit and  social media platforms like Instagram. Not only are these areas of the web easier to search without Tor or I2P, but they are often more relevant, particularly for certain industries and organizations. The article also points out the harm in even “poking around” the Dark Web,

“It can take considerable time, expertise and manual effort to glean useful information. More importantly, impromptu Dark Web reconnaissance can inadvertently expose an organization to greater security risks because of unknown malicious files that can infiltrate the corporate network. Additionally, several criminal forums on the Dark Web utilize a “vouching” system, similar to a private members club, that might require an investigator to commit a crime or at least stray into significantly unethical territory to gain access to the content.”

A novice could easily get into more trouble than they bargained for, especially when taking receipt of stolen goods is considered a felony. Leave the security work to professionals, and make sure the professionals you employ have checked out this Dark Web reading series.

Chelsea Kerwin, November 26, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Business Intelligence Services Partnership Between Swedish Tech Companies Zinnovate and Yellowfin

November 25, 2015

The article titled Business Intelligence Vendor Yellowfin Signs Global Reseller Agreement with Zinnovate on Sys-Con Media provides an overview of the recent partnership between the two companies. Zinnovate will be able to offer Yellowfin’s Business Intelligence solutions and services, and better fulfill the needs that small and mid-size businesses have involving enterprise quality BI. The article quotes Zinnovate CEO Hakan Nilsson on the exciting capabilities of Yellowfin’s technology,

“Flexible deployment options were also important… As a completely Web-based application, Yellowfin has been designed with SaaS hosting in mind from the beginning, making it simple to deploy on-premise or as a cloud-based solution. Yellowfin’s licensing model is simple. Clients can automatically access Yellowfin’s full range of features, including its intuitive data visualization options, excellent Mobile BI support and collaborative capabilities. Yellowfin provides a robust enterprise BI platform at a very competitive price point.”

As for the perks to Yellowfin, the Managing Director Peter Baxter explained that Zinnovate was positioned to help grow the presence of the brand in Sweden and in the global transport and logistics market. In the last few years, Zinnovate has developed its service portfolio to include customers in banking and finance. Both companies share a dedication to customer-friendly, intuitive solutions.
Chelsea Kerwin, November 25, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Predecessor of Virtual Reality Devices and Google Glass?

November 24, 2015

I saw this image in the Daily Mail. This reality enhancing device  is discrete and, in my opinion, fashionable. Will the design influence other augmented/virtual reality devices? Is this the precursor of Google Glass?

image

Source: https://www.pinterest.com/pin/391531761331811268/

I like the symmetry of the design. Tasteful and I assume it goes with formal and informal wear. One question: Does this implementation deliver on point search results and permit voice search?

Stephen E Arnold, November 24, 2015

Watson Put to Work in Academia as a Sounding Board and Study Buddy

November 24, 2015

The article on Kurzweil AI titled IBM’s Watson Shown to Enhance Human-Computer Co-Creativity, Support Biologically Inspired Design discusses a project set up among researchers and student teams at the Georgia Institute of Technology. The teams input information and questions about biomimetics, or biologically inspired design, and then Watson served as an “intelligent research assistant” for a Computational Creativity course in Spring 2015. The professor teaching the class, Ashok Goel, explained the benefits of this training.

“Imagine if you could ask Google a complicated question and it immediately responded with your answer — not just a list of links to manually open, says Goel. “That’s what we did with Watson. Researchers are provided a quickly digestible visual map of the concepts relevant to the query and the degree to which they are relevant. We were able to add more semantic and contextual meaning to Watson to give some notion of a conversation with the AI.”

Biomimetics is all about the comparison and inspiration of biological systems for technological system creation. The ability to “converse” with Watson could even help a student study a complicated topic and understand key concepts. Using Watson as an assistant who can bounce answers back at a professional could apply to many fields, and Goel is currently looking into online learning and healthcare. Watch out, grad students and TAs!

Chelsea Kerwin, November 24, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

IBM Launches Informative Blog

November 20, 2015

IBM has created a free Paper.li blog that features information about the company: IBM’s InfoSphere Master Data Management Roundup. Besides the general categories of Headlines and Videos, readers can explore articles under Science, Technology, Business, and two IBM-specific categories, #Bluemix and #IBM. If you love to watch as Big Blue gets smaller, you will find this free newspaper useful in tracking some of the topics upon which IBM is building its future.

Oddly, though, we did not spot any articles from Alliance at IBM  on the site. Some employees are unhappy with the way the company has been treating its workers, and have launched that site to publicize their displeasure. Here’s their Statement of Principles:

“Alliance@IBM/CWA Local 1701 is an IBM employee organization that is dedicated to preserving and improving our rights and benefits at IBM. We also strive towards restoring management’s respect for the individual and the value we bring to the company as employees. Our mission is to make our voice heard with IBM management, shareholders, government and the media. While our ultimate goal is collective bargaining rights with IBM, we will build our union now and challenge IBM on the many issues facing employees from off-shoring and job security to working conditions and company policy.”

It looks like IBM has more to worry about than sliding profits. Could the two issues be related?

Cynthia Murrell, November 20, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

How to Speak to Executives

November 19, 2015

If you need help communicating with the higher-ups, see “Sales Pitch: How to Sell Your IT Strategy to the Board” at SmartDataCollective. Writer Simon Mitchell points out that, when trying to convince the higher-ups to loosen the purse strings, IT pros are unlikely to succeed if their audience doesn’t understand what they’re talking about. He advises:

“Step out of your technological mindset. Long presentations on subjects outside your audience’s core competence are a waste of everyone’s time. Don’t bore the board with too much detail about how the technology actually works. Focus on the business case for your strategy.”

The write-up goes on to recommend a three-point framework for such presentations: focus on the problem (or opportunity), deliver the strategy, and present costs and benefits. See the post for more on each of these points. It is also smart have the technical details on hand, in case anyone asks. We’re left with four take-aways:

“*Before you present your next big IT initiative to the board, put yourself in their shoes. What do they need to hear?

*Review how you can make tech talk accessible and appealing to non-technical colleagues.

*Keep your presentations short and sweet.

*Focus on the business case for your IT strategy.”

Mitchell also wisely recommends The Economist’s Style Guide for more pointers. But, what if the board does not put you on the agenda or, when you make your pitch, no one cares? Well, that’s a different problem.

Cynthia Murrell, November 19, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Facebook Acts in Its Own Best Interest

November 19, 2015

The article titled Petition: Facebook Betrayed Us By Secretly Lobbying for Surveillance Bill on BoingBoing complains that Facebook has been somewhat two-faced regarding privacy laws and cyber surveillance. The article claims that Facebook publicly opposed the Cybersercurity Information Sharing Act (CISA) while secretly lobbying to push it through. The article explains,

“Facebook has come under public fire for its permissive use of user data and pioneering privacy-invasive experiments in the past. They have also supported previous versions of the cybersecurity info-sharing bills, and their chief Senate lobbyist, Myriah Jordan, worked as General Counsel for CISA’s sponsor, Senator Richard Burr, immediately before moving to Facebook. Facebook has declined to take a public position on CISA, but in recent days sources have confirmed that in fact Facebook is quietly lobbying the Senate to pass it.”

This quotation does beg the question of why anyone would believe that Facebook opposes CISA, given its history. It is, after all, a public company that will earn money in any acceptable way it can. The petition to make Facebook be more transparent about its position on CISA seems more like a request for an apology from a company for being a company than anything else.

Chelsea Kerwin, November 19, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta