Bing Searches for Continuous Development
February 5, 2016
I read “Microsoft Shifts Bing Search Engine To ‘Continuous’ Development Cycle.” Frankly I had never considered the frequency of Bing updates. I do pay attention when Microsoft relies on Baidu or Yandex for search. I may or may not notice when Bing “hides” its shopping service. I have given up trying to locate Microsoft academic search and trying to figure out how to eliminate pop culture references from a Bing results set. In short, I know about Bing, but I don’t think about Bing unless I read articles like “Bing Search for Android Gets New Design and Lots of Bugs in Latest Update.”
Recently Bing realized that it was not making modifications to the site quickly enough. I learned:
The Bing team has openly stated that it was finding its deployment cycle was limiting innovation.
The idea is that Bing will just get better more quickly. Okay, that sounds good. I learned also:
Some people call this learning to fail fast i.e. get features tested and only keep the stuff that works.
I took another look at the write up. The author is a “contributor” to Forbes. Does this mean that the write up is an advertorial? That’s okay, but the conclusion left me scratching my head:
Quite why Bing isn’t the new Google is another topic altogether. Microsoft may never challenge the search giant’s simplicity, functionality and query intelligence – or it might, we don’t know. What we do know is that software updates have to work a whole lot faster than they used to and only the successful ‘code shops’ will now follow this pattern.
My thoughts on why Bing lags behind Google boils down to:
- The Bing index strikes me as less robust than Google’s
- The Bing system does not deliver results that give me access to content on sites which are smaller and often quite difficult via the Bing tools.
Google is not perfect, so I rely on Ixquick.com, Yandex, Unbubble.eu and other systems. Bing is not a second choice for me. Speed of code changes is, like many of my Bing search query results, irrelevant.
Stephen E Arnold, February 5, 2016
Its Official: Facebook and the Dark Web
February 5, 2016
A piece from Nextgov suggests just how ubiquitous the Dark Web could become. Published as Facebook is giving users a new way to access it on the ‘Dark Web’, this article tells us “a sizeable community” of its users are also Dark Web users; Facebook has not released exact figures. Why are people using the Dark Web for everyday internet browsing purposes? The article states:
“Facebook’s Tor site is one way for people to access their accounts when the regular Facebook site is blocked by governments—such as when Bangladesh cut off access to Facebook, its Messenger and Whatsapp chat platforms, and messaging app Viber for about three weeks in November 2015. As the ban took effect, the overall number of Tor users in Bangladesh spiked by about 10 times, to more than 20,000 a day. When the ban was lifted, the number dropped back to its previous level.”
Public perception of the darknet is changing. If there was any metric to lend credibility to the Dark Web being increasingly used for mainstream purposes, it is Facebook adding a .onion address. Individual’s desire for security, uninterrupted and expansive internet access will only contribute to the Dark Web’s user base. While the Silk Road-type element is sure to remain as well, it will be interesting to see how things evolve.
Megan Feil, February 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Elasticsearch Works for Us 24/7
February 5, 2016
Elasticsearch is one of the most popular open source search applications and it has been deployed for personal as well as corporate use. Elasticsearch is built on another popular open source application called Apache Lucene and it was designed for horizontal scalability, reliability, and easy usage. Elasticsearch has become such an invaluable piece of software that people do not realize just how useful it is. Eweek takes the opportunity to discuss the search application’s uses in “9 Ways Elasticsearch Helps Us, From Dawn To Dusk.”
“With more than 45 million downloads since 2012, the Elastic Stack, which includes Elasticsearch and other popular open-source tools like Logstash (data collection), Kibana (data visualization) and Beats (data shippers) makes it easy for developers to make massive amounts of structured, unstructured and time-series data available in real-time for search, logging, analytics and other use cases.”
How is Elasticsearch being used? The Guardian is daily used by its readers to interact with content, Microsoft Dynamics ERP and CRM use it to index and analyze social feeds, it powers Yelp, and her is a big one Wikimedia uses it to power the well-loved and used Wikipedia. We can already see how much Elasticsearch makes an impact on our daily lives without us being aware. Other companies that use Elasticsearch for our and their benefit are Hotels Tonight, Dell, Groupon, Quizlet, and Netflix.
Elasticsearch will continue to grow as an inexpensive alternative to proprietary software and the number of Web services/companies that use it will only continues to grow.
Whitney Grace, February 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Big Data: A Shopsmith for Power Freaks?
February 4, 2016
I read an article that I dismissed. The title nagged at my ageing mind and dwindling intellect. “This is Why Dictators Love Big Data” did not ring my search, content processing, or Dark Web chimes.
Annoyed at my inner voice, I returned to the story, annoyed with the “This Is Why” phrase in the headline.
Predictive analytics are not new. The packaging is better.
I think this is the main point of the write up, but I an never sure with online articles. The articles can be ads or sponsored content. The authors could be looking for another job. The doubts about information today plague me.
The circled passage is:
Governments and government agencies can easily use the information every one of us makes public every day for social engineering — and even the cleverest among us is not totally immune. Do you like cycling? Have children? A certain breed of dog? Volunteer for a particular cause? This information is public, and could be used to manipulate you into giving away more sensitive information.
The only hitch in the git along is that this is not just old news. The systems and methods for making decisions based on the munching of math in numerical recipes has been around for a while. Autonomy? A pioneer in the 1990s. Nope. Not even the super secret use of Bayesian, Markov, and related methods during World War II reaches back far enough. Nudge the ball to hundreds of years farther on the timeline. Not new in my opinion.
I also noted this comment:
In China, the government is rolling out a social credit score that aggregates not only a citizen’s financial worthiness, but also how patriotic he or she is, what they post on social media, and who they socialize with. If your “social credit” drops below a certain level because you post anti-government messages online or because you’re socially associated with other dissidents, you could be denied credit approval, financial opportunities, job promotions, and more.
Just China? I fear not, gentle reader. Once again the “real” journalists are taking an approach which does not do justice to the wide diffusion of certain mathy applications.
Net net: I should have skipped this write up. My initial judgment was correct. Not only is the headline annoying to me, the information is par for the Big Data course.
Stephen E Arnold, February 4, 2016
Google: A Cyber Caliphate Target?
February 4, 2016
I don’t think of Google as a particularly good target for hackers. However, if the information in “ISIS Affiliate Cyber Caliphate Announces Plans to Hack Google” is accurate, my favorite search service is on notice.
According to the write up:
IS affiliate ‘Cyber Caliphate’ forms a Google Hacking Team to Hack Google Remember Cyber Caliphate? Yes, the hacking group affiliated to IS or ISIS/Daesh is planning to hack Google. According to International terrorism watchdog group Terror Monitor, the Islamic State “cyber army” has announced plans to hack Google.
I am not sure what “hack Google” means, but the message seems less than positive.
The Googlers have a reasonably good security system. Worth watching the developments if there are any beyond what seems to be a news release type message.
Stephen E Arnold, February 4, 2016
Hip SXSW Media Conference to Probe the Dark Social
February 4, 2016
This year’s SXSW Conferences & Festivals will be exploring the world of Dark Social, a term introduced by The Atlantic senior editor Alexis C. Madrigal in “Dark Social: We Have the Whole History of the Web Wrong.”
In a SWSX interview, Marc Jensen, Chief Technology Officer of space150 and his associate Greg Swan, Vice President of Public Relations talked about Dark Social and the perception of privacy. They also shared their thoughts on the shift from traditional social sites such as Facebook and Twitter to more alluring Dark Social. In my view their main point was:
This [no referrer data] means that this vast trove of social traffic is essentially invisible to most analytics programs. I call it Dark Social. It shows up variously in programs as “direct” or “typed/bookmarked” traffic, which implies to many site owners that you actually have a bookmark or typed in www.theatlantic.com into your browser. But that’s not actually what’s happening a lot of the time. Most of the time, someone Gchatted someone a link, or it came in on a big email distribution list, or your dad sent it to you. Nonetheless, the idea that “social networks” and “social media” sites created a social web is pervasive. Everyone behaves as if the traffic your stories receive from the social networks (Facebook, Reddit, Twitter, StumbleUpon) is the same as all of your social traffic.
Bob Lefsetz speaks about the differences in social behaviors in The Lefsetz Letter states:
Oldsters are rarely early adopters. They know the value of money, they’re set in their ways. For all the old bloviators bemoaning the loss of privacy online, it’s the kids who got the memo, that if they post pictures of illicit activity they might not get a job in the future. Kids believe in evanescence, oldsters believe in the permanent record.
These differences in social behavior are not only generational, they are transformational. Children and young adults want the freedom to say and do as they please, particularly when it comes to social sites. The more ephemeral the site, the less inhibited they feel. There is a sense of false safety on Snapchat, WeChat and WhatsApp then there is on Facebook or Twitter.Are young people soon to be pawns in a dangerous game of criminal “pickle?”
Dark Social network more likely than not will become breeding grounds for predators. Dark Social could prove to be one of the most powerful tools in criminal’s toolkit. This begs the question: Do the benefits of privacy outweigh the dangers of corruption?
Martin A. Matisoff, MSc, February 4, 2016
Cybercrime as a Service Impacts Hotel Industry and Loyalty Points
February 4, 2016
The marketplaces of the Dark Web provide an interesting case study in innovation. Three types of Dark Web fraud aimed at the hotel industry, for example, was recently published on Cybel Blog. Delving into the types of cybercrime related to the hospitality industry, the article, like many others recently, discusses the preference of cybercriminals in dealing with account login information as opposed to credit cards as detectability is less likely. Travel agencies on the Dark Web are one such way cybercrime as a service exists:
“Dark Web “travel agencies” constitute a third type of fraud affecting hotel chains. These “agencies” offer room reservations at unbeatable prices. The low prices are explained by the fact that the seller is using fraud and hacking. The purchaser contacts the seller, specifying the hotel in which he wants to book a room. The seller deals with making the reservation and charges the service to the purchaser, generally at a price ranging from a quarter to a half of the true price per night of the room. Many sellers boast of making bookings without using stolen payment cards (reputed to be easy for hotels to detect), preferring to use loyalty points from hacked client accounts.”
What will they come up with next? The business to consumer (B2C) sector includes more than hotels and presents a multitude of opportunities for cybertheft. Innovation must occur on the industry side as well in order to circumvent such hacks.
Megan Feil, February 4, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Bing Clocks Search Speed
February 4, 2016
Despite attempts to improve Bing, it still remains the laughing stock of search engines. Google has run it over with its self-driving cars multiple times. DuckDuckGo tagged it as the “goose,” outran it, and forced Bing to sit in the proverbial pot. Facebook even has unfriended Bing. Microsoft has not given up on its search engine, so while there has been a list of novelty improvements (that Google already did or copied not long after their release) it has a ways to go.
Windows Central tells about the most recent Bing development: a bandwidth speed test in “Bing May Be Building A Speed Test Widget Within Search Results.” Now that might be a game changer for a day, until Google releases its own version. Usually to test bandwidth, you have to search for a Web site that provides the service. Bing might do it on command within every search results page. Not a bad idea, especially if you want to see how quickly your Internet runs, how fast it takes to process your query, or if you are troubleshooting your Internet connection.
The bandwidth test widget is not available just yet:
“A reader of the site Kabir tweeted a few images displaying widget like speed test app within Bing both on the web and their phone (in this case an iPhone). We were unable to reproduce the results on our devices when typing ‘speed test’ into Bing. However, like many new features, this could be either rolling out or simply A/B testing by Microsoft.”
Keep your fingers crossed that Microsoft releases a useful and practical widget. If not just go to Google and search for “bandwidth test.”
Whitney Grace, February 4, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Multimedia Data Mining
February 3, 2016
I read “Knowledge Discovery using Various Multimedia Data Mining Technique.” The write up is an Encyclopedia Britannica type summary of the components required to make sense of audio and video.
I noted this passage:
In this paper, we addressed data mining for multimedia data such as text, image, video and audio. In particular, we have reviewed and analyzed the multimedia data mining process with different tasks. This paper also described the clustering models using video for multimedia mining.
The methods used by the systems the author considered use the same numerical recipes which most search vendors know, love, rely upon, and ignore the known biases of the methods: Regression, time series, etc.
My take away is that talk about making sense of the flood of rich media is a heck of a lot easier than processing the video uploaded to Facebook and YouTube in a single hour.
The write up does not mention companies working in this farm yard. There are some nifty case studies to reference as well; for example, Exalead’s video search and my touchstone, Google YouTube and Google Video Search. Blinkx (spun out of Autonomy, a semi famous search outfit) is a juicy tale as well.
In short, if you want to locate videos, one has to use multiple tools, ask people where a video may be found, or code your own solution.
Stephen E Arnold, February 3, 2016
Watson Weekly: Cognitive Insurance
February 3, 2016
IBM ran an ad with the headline “Cognitive Insurance.” You can find the ad in the February 1, 2016, New York Times. The secondary headline is “Outthink Storms,” which is rendered in the favorite colors of some color blind males, shades of green. The main hook “Cognitive Insurance” is in green. I had to look a couple of times to spot the phrase in the upper right hand corner of the image.
What’s interesting to me is that the ad seems to display those nifty isobars I encountered in a science class decades ago. My hunch is that the gale force winds of the Weather acquisition are ruining the coifs of the IBM public relations and advertising wizards.
The phrase has been used by IBM as well as an outfit called “Cognitive-Insurance” at www.cognitive-insurance.org, which to my dismay would not render. No 404. Just a blank page. I saw a couple of references to presentations by various experts.
But No mention of Watson, which I find interesting. Perhaps IBM has decided that Sherlock’s sidekick and the various uses of the word by swimming pool companies, furniture stores, and universities is a bit of an issue.
So cognitive insurance it is. I assume that IBM Watson’s team will make a bee line to Los Angeles where weather has been semi exciting.
Stephen E Arnold, February 3, 2016