Multimedia Data Mining

February 3, 2016

I read “Knowledge Discovery using Various Multimedia Data Mining Technique.” The write up is an Encyclopedia Britannica type summary of the components required to make sense of audio and video.

I noted this passage:

In this paper, we addressed data mining for multimedia data such as text, image, video and audio. In particular, we have reviewed and analyzed the multimedia data mining process with different tasks. This paper also described the clustering models using video for multimedia mining.

The methods used by the systems the author considered use the same numerical recipes which most search vendors know, love, rely upon, and ignore the known biases of the methods: Regression, time series, etc.

My take away is that talk about making sense of the flood of rich media is a heck of a lot easier than processing the video uploaded to Facebook and YouTube in a single hour.

The write up does not mention companies working in this farm yard. There are some nifty case studies to reference as well; for example, Exalead’s video search and my touchstone, Google YouTube and Google Video Search. Blinkx (spun out of Autonomy, a semi famous search outfit) is a juicy tale as well.

In short, if you want to locate videos, one has to use multiple tools, ask people where a video may be found, or code your own solution.

Stephen E Arnold, February 3, 2016

The Enterprise and Online Anonymity Networks

February 3, 2016

An article entitled Tor and the enterprise 2016 – blocking malware, darknet use and rogue nodes from Computer World UK discusses the inevitable enterprise concerns related to anonymity networks. Tor, The Onion Router, has gained steam with mainstream internet users in the last five years. According to the article,

“It’s not hard to understand that Tor has plenty of perfectly legitimate uses (it is not our intention to stigmatise its use) but it also has plenty of troubling ones such as connecting to criminal sites on the ‘darknet’, as a channel for malware and as a way of bypassing network security. The anxiety for organisations is that it is impossible to tell which is which. Tor is not the only anonymity network designed with ultra-security in mind, The Invisible Internet Project (I2P) being another example. On top of this, VPNs and proxies also create similar risks although these are much easier to spot and block.”

The conclusion this article draws is that technology can only take the enterprise so far in mitigating risk. Reliance on penalties for running unauthorized applications is their suggestion, but this seems to be a short-sighted solution if popularity of anonymity networks rise.

 

Megan Feil, February 3, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Encrypted Enterprise Search

February 3, 2016

Another enterprise software distributor has taken the leap into a proprietary encrypted search engine.  Computer Technology Review informs us that “VirtualWorks Releases Its Encrypted Enterprise Search Platform ViaWorks Built On Hitachi Technology.”  VirtualWorks’s enterprise search platform is called ViaWorks and the company’s decision to release an encrypted search engine comes after there has been a rise in data security breaches as well as concern about how to prevent such attacks.  We will not even mention how organizations want to move to the cloud, but are fearful of hacking.  More organizations from shopping in person on the Internet, banking, healthcare, government, and even visiting a library use self-service portals that rely on personal information to complete tasks.  All of these portals can be hacked, so trade organizations and the government are instituting new security measures.

Everyone knows, however, that basic rules and a firewall are not enough to protect sensitive information.  That is why companies like VirtualWorks stay one step ahead of the game with a product like ViaWork built on Hitachi’s Searchable Encryption technology.  ViaWorks is a highly encrypted platform that does not sacrifice speed and accuracy for security

“ViaWorks encrypted enterprise search features are based on AES, a worldwide encryption standard established by NIST; special randomization process, making the encrypted data resistant to advanced statistical attacks; with key management and encryption APIs that store encryption keys securely and encrypt the original data.  ViaWorks provides key management and encryption APIs that store encryption keys securely and encrypt the original data, respectively. Users determine which field is encrypted, such as index files, search keyword or transaction logs.”

VirtualWorks already deployed ViaWorks in beta tests within healthcare, government, insurance, and finance.  Moving information to the cloud saves money, but it presents a security risk and slow search.  A commercial encrypted search engine paired with cloud computing limits the cyber risk.

 

Whitney Grace, February 3, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Bing Rings the Cash Register

February 2, 2016

I read a fascinating story about Bing, Microsoft’s search system which does not include the Fast Search & Transfer goodies in SharePoint Search. Yeah, I know it is confusing.

The write up “Microsoft Corporation Makes Big Bucks with Bing: Cloud Is the Future.” Web search has been, as far as I know, a cloud service for more than a decade. Set that aside.

The important point is:

Microsoft Bing search engine grew by 21% in 2QFY16, emerges as a potent threat to Google.

Poor Google. First, it was the presence of Qwant (what? you don’t remember Qwant?) now it is Bing. Doom looms it seems.

The write up reports in “real” journalistic rhetoric:

Microsoft’s search engine advertising revenues excluding traffic acquisitions cost increased by 21% in the second quarter of fiscal year 2016 (2QFY16). … The software giant is expected to continue its growth in the coming quarters, although what is more important is that Bing will continue to remain profitable and gain shares in the foreseeable future.

I like that “is expected.” Is this a Bing prediction?

I noted this passage:

The software giant is making recognizable efforts to evolve from a Windows-dependent organization to a “cloud-first, mobile-first” company. Microsoft seems to be doing well with its cloud business and making a profit from its Office 365, as well. Users of Windows 10 are also on the rise. Interestingly enough, for these users, Bing-driven Cortana is a very important feature which helps the service generate significant revenue growth to bolster the slipping Windows revenues.

But the kicker for me was the statement:

… Popular speculation suggests that Bing is just a minor detail once you take into account Microsoft’s prospects regarding its position in the upcoming cloud business which it has invested heavily in; and rightly so as the cloud services segment has added indefinite value to the company’s stock.

But isn’t Bing a cloud service? I am confused but the Bing/Fast Search set up is a baffler as well.

Yep, the new Microsoft. And Windows phone? Hmmm.

Stephen E Arnold, February 2, 2016

IBM Sells Technology Platform with a Throwback to Big Datas Mysteries

February 2, 2016

The infographic on the IBM Big Data & Analytics Hub titled Extracting Business Value From the 4 V’s of Big Data involves quantifying Volume (scale of data), Velocity (speed of data), Veracity (certainty of data), and Variety (diversity of data). In a time when big data may have been largely demystified, IBM makes an argument for its current relevance and import, not to mention its mystique, with reminders of the tremendous amounts of data being created and consumed on a daily basis. Ultimately the graphic is an ad for the IBM Analytics Technology Platform. The infographic also references a “fifth “V”,

“Big data = the ability to achieve greater Value through insights from superior analytics. Case Study: A US-based aircraft engine manufacturer now uses analytics to predict engine events that lead to costly airline disruptions, with 97% accuracy. If this prediction capability had ben available in the previous year, it would have saved $63 million.”
IBM struggles for revenue. But, obviously from this infographic, IBM knows how to create Value with a capital “V”, if not revenue. The IBM Analytics Technology Platform promises speedier insights and actionable information from trustworthy sources. The infographic reminds us that poor quality in data leads to sad executives, and that data is growing exponentially, with 90% of all data forged in only the last two years.

 

Chelsea Kerwin, February 2, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search Almost Did Not Make the Graph

January 30, 2016

I read “323 Marketing Tech Startups Fetched over $11B from VCs in 2015 (Research).” The write up suggested to me that a horse racing stable mentality appears to have some appeal for the venture capital crowd. The theory has two parts.

First, the outfits are acting a bit like sheep. Second, the belief is that some of these horses will win the Kentucky Derby. That’s fine. I don’t have to explain to investors where the money went nor do I have to figure out how to repay the investors who want their money back or a payout pronto.

The chart reveals another facets of the data. Here’s a tiny version of the chart:

image

You will have to consult the original post to read the labels on the y axis. Note that “search” appears, but it is a brushing shoulders in the long tail with SEO and market research. In short, at the far right hand edge of the y axis. Investors supporting the long shots are brave steed owners.

Now check out the title of the write up. Do you see “marketing tech”? I do. It strikes me that research is not important to “marketing tech” as a broad sector.

But what are the top three sectors sucking cash? Answer:

  • Analytics
  • Ad tech
  • Design
  • Social
  • Data infrastructure.

Will search regain its former glory? Probably not. Mules amidst the stallions? Nah, search vendors can just change their marketing lingo.

Stephen E Arnold, January 30, 2016

Desperate for Traffic: Black Hat SEO Appears Quite Tasty

January 29, 2016

I read an interesting article. The title? “Are There Any Black Hat SEO Strategies That Work?” For years I have pointed out that if you want traffic, you need to buy Adwords. If the budget for an Adword campaign is too much for your pocketbook, you have to be pragmatic. Short cuts will land you in Google’s version of purgatory. If you have not been there, check out Dante.

The write up says:

Black hat tactics are ones that use deception, manipulation, and gimmicks to trick search engines into ranking a site higher than it otherwise would rank.

That sounds like a good description of most search engine optimization methods. Google does not care so webmasters try to fool Mother Google.

The write up sort of agrees with me. I noted this comment:

White hat tactics can be technically manipulative, since we’re taking specific actions with the goal of trying to rank higher in organic search…

The author then reviews some well known methods for getting an invitation to digital purgatory.

I came away from the write up with a sense that folks are desperate for traffic. Google buys traffic from Apple. You can buy traffic from Google. This seems pretty basic to me.

SEO is a game of diminishing returns. Even raising the notion of black hat methods only makes the white hat methods show their true color: Black. What’s on the head of the SEO maven? A black Barcelona ball cap. Black hat. Get it?

Stephen E Arnold, January 29, 2016

Bing Goes Green, as in Dollar Bills and Brand New Logo

January 29, 2016

The article on Microsoft News titled Microsoft Releasing New Bing Logo Today briefly overviews the recent growth and profitability of the often mocked and overlooked search engine. Microsoft also updated Cortana lately, which is deeply connected to Bing search. So what will the new Bing logo look like? The article explains,

“In the new logo, Microsoft is switching its color scheme to green as it  “is easier to see over yellow” and “b” in now in upper case. This new version of the logo will be used across various Microsoft apps and services. Speaking to AdAge, Rik van der Kooi, Microsoft’s corporate VP of advertiser and publisher solutions said that Bing is the only search engine that is experiencing steady, consistent growth and have increased our share for 26 consecutive quarters.”

The article also points out that it is Bing powering Yahoo, AOL, Apple Siri and several other services, from behind the scenes. The green logo looks less like an imitation of Google, especially with the capitalization. Perhaps the new logo is meant to be easier on the eyes, but it is also certainly trying to keep up the positive attention Bing has been receiving lately as 1/3 of the search market.

Chelsea Kerwin, January 29, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Maps: Blurred Spots

January 28, 2016

Short honk: You might be able to search by lat and long, but you will not see “it.” To get a partial run down on what’s not visible in Google Maps, navigate to “Controversial Places That Google Maps Won’t Let You See.”

The question becomes, “How does one see these blurred locations?” There are some options, but that’s the information covered in my lectures for Telestrategies’ “Now That Google Doesn’t Work, What Does an Investigator Do.” There are some free and for fee services which are quite useful.

A good question to ponder is, “Why?”

Why are some locations visible via Google and the same locations are not visible in Bing?

If it is not there, one cannot search it. If it is there and blurred, one has to find an option. Life online. Such a drag.

Stephen E Arnold, January 28, 2016

Anonymity Not Always Secured for Tor and Dark Web Users

January 28, 2016

From the Washington Post comes an article pertinent to investigative security technologies called This is how the government is catching people who use child porn sites. This piece outlines the process used by the FBI to identify a Tor user’s identity, despite the anonymity Tor provides. The article explains how this occurred in one case unmasking the user Pewter,

“In order to uncover Pewter’s true identity and location, the FBI quietly turned to a technique more typically used by hackers. The agency, with a warrant, surreptitiously placed computer code, or malware, on all computers that logged into the Playpen site. When Pewter connected, the malware exploited a flaw in his browser, forcing his computer to reveal its true Internet protocol address. From there, a subpoena to Comcast yielded his real name and address.”

Some are concerned with privacy of the thousands of users whose computers are also hacked in processes such as the one described above. The user who was caught in this case is arguing the government’s use of such tools violated the Fourth Amendment. One federal prosecutor quoted in the article describes the search processes used in this case as a “gray area in the law”. His point, that technology is eclipsing the law, is definitely one that deserves more attention from all angles: the public, governmental agencies, and private companies.

 

Megan Feil, January 28, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta