No Microfiche Required

November 16, 2015

Longstanding publications are breathing new life into their archives by re-publishing key stories online, we learn from NiemanLab’s article, “Esquire Has a Cold: How the Magazine is Mining its Archives with the Launch of Esquire Classics.” We learn that Esquire has been posting older articles on their Esquire Classics website, timed to coincide with related current events. For example, on the anniversary of Martin Luther King Jr.’s death last April, the site republished a 1968 article about his assassination.

Other venerable publications are similarly tapping into their archives. Writer Joseph Lichterman notes:

“Esquire, of course, isn’t the only legacy publication that’s taking advantage of archival material once accessible only via bound volumes or microfiche. Earlier this month, the Associated Press republished its original coverage of Abraham Lincoln’s assassination 150 years ago…. Gawker Media’s Deadspin has The Stacks, which republishes classic sports journalism originally published elsewhere. For its 125th anniversary last year, The Wall Street Journal published more than 300 archival articles. The New York Times runs a Twitter account, NYT Archives, that resurfaces archival content from the Times. It also runs First Glimpses, a series that examines the first time famous people or concepts appeared in the paper.”

This is one way to adapt to the altered reality of publication. Perhaps with more innovative thinking, the institutions that have kept us informed for decades (or centuries) will survive to deliver news to our great-grandchildren. But will it be beamed directly into their brains? That is another subject entirely.

 

Cynthia Murrell, November 16, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Expect Disruption from Future Technology

November 13, 2015

A dystopian future where technology has made humanity obsolete is a theme older than the Industrial Revolution.  History has proven that while some jobs are phased out thanks to technology more jobs are created by it, after all someone needs to monitor and make the machines.  As technology grows and makes computing systems capable of reason, startups are making temporary gigs permanent jobs, and 3D printing makes it possible to make any object, the obsolete humanity idea does not seem so far-fetched.  Kurzweilai shares a possible future with “The SAP Future Series: Digital Technology’s Exponential Growth Curve Foretells Avalanche Of Business Disruption.”

While technology has improved lives of countless people, it is disrupting industries.  These facts prove to be insightful into how disruptive:

  • In 2015 Airbnb will become the largest hotel chain in the world, launched in 2008, with more than 850,000 rooms, and without owning any hotels.
  • From 2012 to 2014, Uber consumed 65% of San Francisco’s taxi business.
  • Advances in artificial intelligence and robotics put 47% of US employment — over 60 million jobs — at high risk of being replaced in the next decade.
  • 10 million new autonomous vehicles per year may be entering US highways by 2030.
  • Today’s sensors are 1 billion times better — 1000x lighter, 1000x cheaper, 1000x the resolution — than only 40 years ago. By 2030, 100 trillion sensors could be operational worldwide.
  • DNA sequencing cost dropped precipitously — from $1 billion to $5,000 —  in 15 years. By 2020 could be $0.01.
  • In 2000 it took $5,000,000 to launch an internet start-up. Today the cost is less than $5,000.

Using a series of videos, SAP explains how disruption will change the job market, project management, learning, and even predicting future growth.  Rather than continuing the dystopia future projections, SAP positions itself to offer hope and ways to adapt for your success.  Humanity will be facing huge changes because of technology in the near future, but our successful ability to adapt always helps us evolve.

3DWhitney Grace, November 13, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

Product Hunt Adds Collections to Its Search Results

November 13, 2015

Product Hunt is a website for the cutting-edge consumer, where users share information about the latest and greatest in the tech market. The Next Web tells us, “Product Hunt Now Lets You Follow and Search for Collections.” A “collection” can be established by any user to curate and share groups of products. An example would be a selection of website-building tools, or of the best electronic-device accessories for charging electronic devices. The very brief write-up reveals:

Product Hunt, the Web’s favorite destination to discover new apps, gadgets and connected services, has updated its Collections feature, allowing users to follow and search for curated lists. You can now follow any collection you find interesting to receive notifications when new products are added to them. Collections will also show up in search results alongside products. In addition, curators can add comments to products in their collections to describe them or note why they’ve included them in their list.”

So now finding the best of the latest is even easier. An important tool for anyone with a need, and the means, to keep in front of the technology curve. Launched in 2013, Product Hunt is based in San Francisco. Their Collections feature was launched last December, and this year the site also added sections specifically for books and for games.

Cynthia Murrell, November 13, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Google Takes Aim at Internet Crime

November 12, 2015

Google has a plan to thwart Internet crime: make it too expensive to be worth it. The company’s Online Security Blog examines the issue in “New Research: The Underground Market Fueling For-Profit Abuse.” The research was presented last June at the Workshop on the Economics of Information Security 2015; I recommend those interested check out the full report here.

The post describes the global online black market that has grown over the last ten years or so, where criminals trade in such items as stolen records, exploit kits, scam hosting, and access to compromised computers. The profit centers which transfer the shady funds rest upon an infrastructure, the pieces of which cost money. Google plans to do what it can to increase those costs. The write-up explains:

“Client and server-side security has dominated industry’s response to digital abuse over the last decade. The spectrum of solutions—automated software updates, personal anti-virus, network packet scanners, firewalls, spam filters, password managers, and two-factor authentication to name a few—all attempt to reduce the attack surface that criminals can penetrate. While these safeguards have significantly improved user security, they create an arms race: criminals adapt or find the subset of systems that remain vulnerable and resume operation.

“To overcome this reactive defense cycle, we are improving our approach to abuse fighting to also strike at the support infrastructure, financial centers, and actors that incentivize abuse. By exploring the value chain required to bulk register accounts, we were able to make Google accounts 30–40% more expensive on the black market. Success stories from our academic partners include disrupting payment processing for illegal pharmacies and counterfeit software outlets advertised by spam, cutting off access to fake accounts that pollute online services, and disabling the command and control infrastructure of botnets.”

Each of the links in the above quote goes to an in-depth paper, so there’s plenty of material to check out there. Society has been trying for centuries to put black markets out of business. Will the effort be more successful in the virtual realm?

Cynthia Murrell, November 12, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Business Intelligence: Sort of Like Enterprise Search

November 11, 2015

I read a mini listicle called “3 reasons Business Intelligence Projects Fail and How to Avoid Them.” The article is 348 words in length. The article is “sponsored content,” which means an outfit called Sisense paid to get this listicle in front of folks like me. Well, maybe not exactly like me.

The problems of business intelligence are the same problems bedeviling those who would implement an enterprise search system or any system. The folks involved have to have time to set up and make the system work. The people using the system have to be trained. And the system will trigger hidden costs.

Great. No hidden costs.

I wondered what a Sisense did for a living. According to the Sisense Web site, the company “simplifies business intelligence for complex data.” The Web site asserts:

The only business intelligence software that lets you easily prepare and analyze both big and disparate datasets.

Here’s the description of the company:

Sisense is an award-winning, full-stack Business Intelligence and Analytics software that’s leading the way into a new era of BI. Our software is creating quite a buzz for its powerful technology as Sisense is the only fully-functional Business Intelligence tool that lets non-techies join multiple large data sets, build smart dashboards with great data visualizations, and share with thousands of users. Our secret sauce is the incredible technology behind Sisense that’s designed to be used by business users, without dependence on coding, IT or data scientists. Sisense provides a centralized database on standard hardware, and serves more queries, more users, and more data than any other BI tool on the market.

I like the word “incredible.” In my opinion, the mini listicle which tells me how to avoid the three reasons why business intelligence project fails seems a trifle fluffy.

Sigh. That makes sense.

Stephen E Arnold, November 11, 2015

Amazon Punches Business Intelligence

November 11, 2015

Amazon already gave technology a punch when it launched AWS, but now it is releasing a business intelligence application that will change the face of business operations or so Amazon hopes.  ZDNet describes Amazon’s newest endeavor in “AWS QuickSight Will Disrupt Business Intelligence, Analytics Markets.”  The market is already saturated with business intelligence technology vendors, but Amazon’s new AWS QuickSight will cause another market upheaval.

“This month is no exception: Amazon crashed the party by announcing QuickSight, a new BI and analytics data management platform. BI pros will need to pay close attention, because this new platform is inexpensive, highly scalable, and has the potential to disrupt the BI vendor landscape. QuickSight is based on AWS’ cloud infrastructure, so it shares AWS characteristics like elasticity, abstracted complexity, and a pay-per-use consumption model.”

Another monkey wrench for business intelligence vendors is that AWS QuickSight’s prices are not only reasonable, but are borderline scandalous: standard for $9/month per user or enterprise edition for $18/month per user.

Keep in mind, however, that AWS QuickSight is the newest shiny object on the business intelligence market, so it will have out-of-the-box problems, long-term ramifications are unknown, and reliance on database models and schemas.  Do not forget that most business intelligence solutions do not resolve all issues, including ease of use and comprehensiveness.  It might be better to wait until all the bugs are worked out of the system, unless you do not mind being a guinea pig.

Whitney Grace, November 11, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Banks Turn to Blockchain Technology

November 9, 2015

Cryptocurrency has come a long way, and now big banks are taking the technology behind Bitcoin very seriously, we learn in “Nine of the World’s Biggest Banks Form Blockchain Partnership” at Re/code. Led by financial technology firm R3, banks are signing on to apply blockchain tech to the financial markets. A few of the banks involved so far include Goldman Sacks, Barclays, JP Morgan, Royal Bank of Scotland, Credit Suisse, and Commonwealth Bank of Australia. The article notes:

“The blockchain works as a huge, decentralized ledger of every bitcoin transaction ever made that is verified and shared by a global network of computers and therefore is virtually tamper-proof. The Bank of England has a team dedicated to it and calls it a ‘key technological innovation.’ The data that can be secured using the technology is not restricted to bitcoin transactions. Two parties could use it to exchange any other information, within minutes and with no need for a third party to verify it. [R3 CEO David] Rutter said the initial focus would be to agree on an underlying architecture, but it had not yet been decided whether that would be underpinned by bitcoin’s blockchain or another one, such as one being built by Ethereum, which offers more features than the original bitcoin technology.”

Rutter did mention he expects this tech to be used post-trade, not directly in exchange or OTC trading, at least not soon. It is hoped the use of blockchain technology will increase security while reducing security and errors.

Cynthia Murrell, November 9, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Digging into Googles Rich Answer Vault

November 4, 2015

Google has evolved from entering precise keywords into the search engine to inputting random questions, complete with question mark.  Google has gone beyond answering questions and keyword queries.  Directly within search results for over a year now, Google has included content referred to as “rich answers,” meaning answers to search queries without having to click through to a Web site.  Stone Temple Consulting was curious how much people were actually using rich answers, how they worked, and how can they benefit their clients.  In December 2014 and July 2015, they ran a series of tests and “Rich Answers Are On The Rise!” discusses the results.

Using the same data sets for both trials, Stone Temple Consulting discovered that use of Google rich answers significantly grew in the first half of 2015, as did the use of labeling the rich answers with titles, and using images with them.  The data might be a skewed in favor of the actual usage of rich answers, because:

“Bear in mind that the selected query set focused on questions that we thought had a strong chance of generating a rich answer. The great majority of questions are not likely to do so. As a result, when we say 31.2 percent of the queries we tested generated a rich answer, the percentage of all search queries that would do so is much lower.”

After a short discussion about the different type of rich answers Google uses and how those different types of answers grew.  One conclusion that can be drawn from the types of rich answers is that people are steadily relying more and more on one tool to find all of their information from a basic research question to buying a plane ticket.

Whitney Grace, November 4, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Journalists Use Dark Web Technology to Protect Source Privacy

November 4, 2015

Canada’s paper the Globe and Mail suggests those with sensitive information to reveal some Dark Web tech: “SecureDrop at the Globe and Mail.” As governments get less squeamish about punishing whistleblowers, those with news the public deserves to know must  be increasingly careful how they share their knowledge. The website begins by informing potential SecureDrop users how to securely connect through the Tor network. The visitor is informed:

“The Globe and Mail does not log any of your interactions with the SecureDrop system, including your visit to this page. It installs no tracking cookies or tracking software of any kind on your computer as part of the process. Your identity is not exposed to us during the upload process, and we do not know your unique code phrase. This means that even if a code phrase is compromised, we cannot comply with demands to provide documents that were uploaded by a source with that code phrase. SecureDrop itself is an open-source project that is subject to regular security audits, reducing the risk of bugs that could compromise your information. Information provided through SecureDrop is handled appropriately by our journalists. Journalists working with uploaded files are required to use only computers with encrypted hard drives and follow security best practices. Anonymous sources are a critical element of journalism, and The Globe and Mail has always protected its sources to the best of its abilities.

The page closes with a warning that no communication can be perfectly secure, but that this system is closer than most. Will more papers take measures to ensure folks can speak up without being tracked down?

Cynthia Murrell, November 4, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

It Is Not a Bird in the Law Firm

November 3, 2015

In science-fiction, artificial intelligence is mostly toyed around with in robots and androids.  Machines that bear artificial intelligence either try to destroy humanity for their imperfection or coexist with humanity in a manner that results in comedic situations.  In reality, artificial intelligence exists in most everyday objects from a mobile phone to a children’s toy.  Artificial intelligence is a much more common occurrence than we give our scientists credit for and it has more practical applications than we could imagine.  According to PR Newswire one of the top artificial intelligence developers has made a new deal for their popular product, “RAVN Systems’ Artificial Intelligence Platform Is Deployed At Berwin Leighton Paisner.”

RAVN Systems is known for their top of line software in enterprise search, unstructured big data analytics, knowledge management, and, of course, artificial intelligence. The international law firm Berwin Leighton Paisner recently deployed RAVN Systems’s  RAVN Applied Cognitive Engine (RAVN ACE).  RAVN ACE will work in the law firm’s real estate practice, not as a realtor, but as the UK’s first contract robot.  It will use cutting-edge AI to read and interpret information from documents, converting unstructured data into structured output.  RAVN ACE will free up attorneys to complete more complex, less menial tasks.

“Matthew Whalley, Head of Legal Risk Consultancy at BLP commented, ‘The robot has fast become a key member of the team. It delivers perfect results every time we use it. Team morale and productivity has benefited hugely, and I expect us to create a cadre of contract robots throughout the firm. If the reaction to our first application is any indication, we will be leading the implementation of AI in the Law for some time to come.’ ”

RAVN ACE has more applications than writing real estate contracts.  It can be deployed for financial services, media, telecommunications, and more.  Taking over the menial tasks will save on time , allowing organizations to reinvest time into other projects.

Whitney Grace, November 3, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta