The New Shakespeare: The Oracle Anti Google Slide Deck
May 30, 2016
Yep, it is Sunday. You may be thinking about your next presentation. I would suggest that you navigate to “How Oracle Made Its Case against Google, in Pictures.” I don’t know much about great writing, but I do have a nose for a killer PowerPoint. Believe me. Oracle’s legal eagles crafted a Julius Caesar or Macbeth grade set of slides for its current Google dust up. My thought is that if you are working to convince folks to decide a multi billion dollar matter in your favor, you will want to check out the Oracle work.
Here is one slide or image from what appears to be a reliable source:
I know that it is not readable. The main point is that Oracle alleges that the Alphabet Google thing “copied line for line” 11,000 lines of code.
I don’t have a dog in the fight. I did find it amusing that this allegedly accurate slide quotes Alphabet Googlers. I believe the phrase is “hoisted by one’s own petard.” I am not sure what it means, but my inner voice says that a petard doing the hoisting for one’s own person is not what the doctor ordered:
Oh, before I forget, the write up begins with an allegedly accurate quote from an Alphabet Googler. The statement is, “I wanted to win.” When I read the line, I thought the person allegedly making the statement was Peter Thiel. An errant thought.
The only problem… Oracle lost. Go, Alphabet.
Stephen E Arnold, May 30, 2016
Hacktivists Become Educators on Dark Web
May 30, 2016
A well-known hactivist group is putting themselves out there on the Dark Web. International Business Times reported on the collective’s new chatroom in a piece entitled Anonymous hackers launch dark web chatroom OnionIRC to teach next generation of hacktivists. Anoynmous intends to teach those interested in hacktivism about the basics: coding, encryption and even history. IBT journalists went undercover and logged into the chat room to learn more about the next generation of hacktivists. Reporting back, the article states,
“[we] found roughly 40 people logged in and talking about topics, such as GPG encryption, NSA surveillance and how the government reportedly installs backdoors into computer software. According to HackRead, which first reported on the chatroom, the IRC has at times been particularly dysfunctional. Indeed, during our time in the chatroom, some of the contributors appeared to lack any hacking knowledge at all. “I want to learn Bash. Beginner level. Where should I start?” wrote one anonymous contributor. “With a Bash Book,” came the reply. This group, at least in its current form, is a far-cry from the more sophisticated and feared members that in the past have been known to hack federal agencies and assist in global political uprisings.”
This article’s reference to the “next generation of hacktivists” calls to mind a question about the age demographics of Dark Web users. Our bet is that, while they may tend young, there is likely to be significant representation from a variety of age groups. While it’s captured media attention, the Dark Web is no new phenomenon.
Megan Feil, May 30, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Financial Institutes Finally Realize Big Data Is Important
May 30, 2016
One of the fears of automation is that human workers will be replaced and there will no longer be any more jobs for humanity. Blue-collar jobs are believed to be the first jobs that will be automated, but bankers, financial advisors, and other workers in the financial industry have cause to worry. Algorithms might replace them, because apparently people are getting faster and better responses from automated bank “workers”.
Perhaps one of the reasons why bankers and financial advisors are being replaced is due to their sudden understanding that “Big Data And Predictive Analytics: A Big Deal, Indeed” says ABA Banking Journal. One would think that the financial sector would be the first to embrace big data and analytics in order to keep an upper hand on their competition, earn more money, and maintain their relevancy in an ever-changing world. They, however, have been slow to adapt, slower than retail, search, and insurance.
One of the main reasons the financial district has been holding back is:
“There’s a host of reasons why banks have held back spending on analytics, including privacy concerns and the cost for systems and past merger integrations. Analytics also competes with other areas in tech spending; banks rank digital banking channel development and omnichannel delivery as greater technology priorities, according to Celent.”
After the above quote, the article makes a statement about how customers are moving more to online banking over visiting branches, but it is a very insipid observation. Big data and analytics offer the banks the opportunity to invest in developing better relationships with their customers and even offering more individualized services as a way to one up Silicon Valley competition. Big data also helps financial institutions comply with banking laws and standards to avoid violations.
Banks do need to play catch up, but this is probably a lot of moan and groan for nothing. The financial industry will adapt, especially when they are at risk of losing more money. This will be the same for all industries, adapt or get left behind. The further we move from the twentieth century and generations that are not used to digital environments, the more we will see technology integration.
Whitney Grace, May 30, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Hewlett Packard Enterprise: Cut It Up and Sell Off the Parts
May 28, 2016
Someone called me to alert me to Hewlett Packard Enterprise was doing the mitosis approach to financial goodness. As you recall, gentle reader, Hewlett Packard chopped itself in half, emulating Solomon’s approach to shared custody. One part was printers and ink. The other part was everything not part of the printers and ink deal.
The resulting non ink outfit was dubbed Hewlett Packard Enterprise. The solution to HP’s revenue problems was to create two companies, make bankers happy, and ponder what to do next. The answer according to “Hewlett Packard Enterprise Surges on Move to Merge Services Unit with CSC,” is to create an HP outfit and a spinoff/merger deal.
The write up states:
The union will create a “a pure-play, global IT services powerhouse,” said HP Enterprise in a statement.
The HPE entity will sell hardware. The HP-CSC entity which seems to be called Spinco. Spinco suggests spin off or spin out and reminds me of PR spin. HPE is now free to become a big dog because the annoying little puppies like printers and ink and the thrilling EDS operation are at a minimum an arm’s length away.
I recall a series of MBA type paragraphs published by ZDNet. Hey, a listicle dragged out over six weeks is ideal for the mobile phone researcher. Navigate to ”Worst Tech Mergers and Acquisitions.” Number one with a bullet was HP and Compaq. HP also made the list at Number four with its purchase of Autonomy. Not bad 40 percent of the top five worst deals of all time in the eyes of the really expert ZDNet researchers.
I once tracked Autonomy closely. I have included information about IDOL in the forthcoming Palantir Notebook we are finalizing. In the last couple of years, Autonomy faded from my radar. Obviously it is not a giant blip on the HPE control room either.
Several questions/observations are warranted:
- Is it now time for the top brass at HPE to withdraw from the field of battle now that the corporate aircraft carrier has been refitted and once again sea worthy?
- What happens to those luck licensees of various Autonomy technologies?
- Will HPE continue to grow its revenues and once again hit the $100 billion in revenue mark?
- Will People Magazine cover the party the legal eagles, accountants, and financial institutions which worked on the deal will hold at the La Quinta in South San Francisco?
From my vantage point in Harrod’s Creek, Kentucky, I am not sure that the newly painted HPE will be able to match the performance of other, more modern money machines.
Stephen E Arnold, May 28, 2016
From My Palantir Archive: Security
May 27, 2016
I was curious about my notes about Palantir and its security capabilities. I have some digital and paper files. I print out some items and tuck them in a folder labeled “Hobbits.” In my Hobbit folder was:
Q.&A.: Guarding Personal Data From Abuse by Insiders, October 14, 2015
You may be able to locate a copy of this story by searching the New York Times or by going to your local library and using its OPAC. If that doesn’t work, you may have to delve into the flagging world of commercial databases.
In the write up, I noticed that I had circled in tell-the-truth blue this passage:
For privacy, the main worry may not be hackers as much as bad actions by authorized users. A useful concept in information system architecture is accountability oversight. Flagging people who misuse things. Revealing private things only by degree. Having access controls.
I thought of this because Buzzfeed has published a couple of write ups based on Palantir’s own information. Presumably the information could not have come from insiders because Palantir’s own security professional referenced the firm’s auditing capability.
The idea, as I understand it, is that one can use Palantir’s logs to “walk back the cat” and identify a person or persons who might have taken an action to reveal company information.
I also circled:
When a data breach is exposed, it’s a discrete event. You know what will happen, for the most part. Marketing is directed at a lifestyle.
Yeah, but Buzzfeed has published two articles and both struck me as deriving factoids from different sources.
With Socom embracing Palantir for maybe three years, my question is, “Does Palantir have safeguards in place which will make a third Buzzfeed type article a low probability or 0.000001 event?
Yikes, two articles based on what may be leaked internal information. What happens if sensitive military information goes walkabout?
I assume there is no such thing as a Hobbit alert? I need to read The Architecture of Privacy, an O’Reilly book written by Palantirians or Hobbits. I hope this is not a do-as-I-say, not a do-as-I-do thing.
Stephen E Arnold, May 27, 2016
VK.com: An Alternative to Facebook
May 27, 2016
VK is the name of the “old” VKontakte social networking service. My estimates peg the traffic to the site at about 30 percent of Facebook. The user count is in the 300 million range and growing. The user base is concentrated in Russia, but the service is attracting users from other countries. Online translation tools make it easy for a non Russian speaker to use the service.
Earlier this year, I read “German Neo Nazis Flocking to Putin’s Facebook Knock off VKontakte.” The write up seems a bit one sided, but social network sites allegedly linked to Mr. Putin suggests that a bit of additional research and investigation are warranted.
You can sign up and explore VK.com at www.vk.com. I provide some basics for appropriate prophylactic measures in my Dark Web lectures. One thought is okay here: Be prudent.
You will need a VK.com account to access an interesting facial recognition service called FindFace. The site looks like this:
Like Google’s “search by photo”, the FindFace service delivers close matches to the face you upload to the service. The Guardian published “Face Recognition App Taking Russia by Storm May Bring End to Public Anonymity.” The digital wannabe stated:
FindFace compares photos to profile pictures on social network Vkontakte and works out identities with 70% reliability.
I mention VK.com and FindFace because I was asked if there were an alternative to Facebook. The answer is, “VC.com.” However, the use of the service for certain types of groups and certain purposes is less easy than it was in the past. Some folks can use the VK.com apps and features instead of fooling around with Dark Web services.
Stephen E Arnold, May 27, 2016
The Reinterpretation of Google History
May 27, 2016
I read “Why Google Beat yahoo in the War for the Internet.” The information in the article touches upon some important points; for example, Google focused on a more homogeneous infrastructure. The history of Google, however, includes some tactical moves which the article ignores.
My enthusiasm for recycling the information about Google’s first five years has shriveled since I published the third volume of my Google trilogy. I want to point out several factoids which, no doubt, will interest few today. The article makes much of what is described as a “fresh start.” I do not agree with the “fresh” part.
First, Google is a descendent of Alta Vista, Jon Kleinberg’s Clever, and the information access research conducted at Stanford University and other universities with an interest in this technical field. As a result, the infrastructure benefits from Digital Equipment’s investment in its Alta Vista system. Much of that “knowledge” migrated to Google as Messrs. Brin and Page hired notable professionals away from the chaos of Alta Vista under Hewlett Packard’s management. Jeff Dean, Simon Tong, and others are responsible for much of the infrastructure for Google. The Alta Vista system was anchored in the DEC technology. The memory management benefits were obtained at a cost. Google embraced commodity hardware and a big chunk of the Alta Vista thinking. Fresh? Well, sort of.
Second, Google’s scrutiny of Yahoo had a couple of payoffs. Yahoo was a crazy quilt of warring tribes. Each tribe had its own technology idols. Google interpreted this as expensive and focused on reducing the costs by standardizing on systems and methods to a greater degree than Yahoo did. Over time, Yahoo became more sluggish due to its different fiefdoms. Google was comparatively stronger due to its less chaotic approaches. Don’t get me wrong. Google in its first five years was a wild and crazy outfit. Yahoo was wilder and crazier. As part of Google’s learning from Yahoo, Google recognized the value of selling ads the Yahoo way. Yahoo was unhappy with Google’s borrowing of its GoTo.com/Overture approach. Google settled a legal spat with about $1 billion in payments to the Yahooligans. But the majority of Google’s revenue comes from that GoTo.com/Overture me too play.
Third, Google, like Yahoo, is not sure what it will be from year to year. The difference is that Google has crafted a relatively consistent flow of advertising revenue from its early and somewhat crude pre-Oingo days. Google integrated acquired technologies more effectively than Yahoo typically did. The ability to integrate provided Google an important edge.
There are other touchpoints in Google’s early days. From my point of view, Google is from its inception a beneficiary of good luck because the competitors in Web search were distracted in an effort to become portals. Google, as I see the company, is less of an innovator and more of an emulator. Google has yet to demonstrate that renaming the company, reorganizing the units, and funding projects like cheating death will yield the next big thing.
Google, for me, was a one off, an anomaly.
Stephen E Arnold, May 27, 2016
Paid Posts and PageRank
May 27, 2016
Google users rely on the search engine’s quality-assurance algorithm, PageRank, to serve up the links most relevant to their query. Blogger and Google engineer Matt Cutts declares, reasonably enough, that “Paid Posts Should Not Affect Search Engines.” His employer, on the other hand, has long disagreed with this stance. Cutts concedes:
“We do take the subject of paid posts seriously and take action on them. In fact, we recently finished going through hundreds of ‘empty review’ reports — thank you for that feedback! That means that now is a great time to send us reports of link buyers or sellers that violate our guidelines. We use that information to improve our algorithms, but we also look through that feedback manually to find and follow leads.”
Well, that’s nice to know. However, Cutts emphasizes, no matter how rigorous the quality assurance, there is good reason users may not want paid posts to make it through PageRank at all. He explains:
“If you are searching for information about brain cancer or radiosurgery, you probably don’t want a company buying links in an attempt to show up higher in search engines. Other paid posts might not be as starkly life-or-death, but they can still pollute the ecology of the web. Marshall Kirkpatrick makes a similar point over at ReadWriteWeb. His argument is as simple as it is short: ‘Blogging is a beautiful thing. The prospect of this young media being overrun with “pay for play” pseudo-shilling is not an attractive one to us.’ I really can’t think of a better way to say it, so I’ll stop there.”
Cynthia Murrell, May 27, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Open Source Software Needs a Micro-Payment Program
May 27, 2016
Open source software is an excellent idea, because it allows programmers across the globe to share and contribute to the same project. It also creates a think tank like environment that can be applied (arguably) to any tech field. There is a downside to open source and creative commons software and that is it not a sustainable model. Open Source Everything For The 21st Century discusses the issue in their post about “Robert Steele: Should Open Source Code Have A PayPal Address & AON Sliding Scale Rate Sheet?”
The post explains that open source delivers an unclear message about how code is generated, it comes from the greater whole rather than a few people. It also is not sustainable, because people do need funds to survive as well as maintain the open source software. Fair Source is a reasonable solution: users are charged if the software is used at a company with fifteen or more employees, but it too is not sustainable.
Micro-payments, small payments of a few cents, might be the ultimate solution. Robert Steele wrote that:
“I see the need for bits of code to have embedded within them both a PayPalPayPal-like address able to handle micro-payments (fractions of a cent), and a CISCO-like Application Oriented Network (AON) rules and rate sheet that can be updated globally with financial-level latency (which is to say, instantly) and full transparency. Some standards should be set for payment scales, e.g. 10 employees, 100, 1000 and up; such that a package of code with X number of coders will automatically begin to generate PayPal payments to the individual coders when the package hits N use cases within Z organizational or network structures.”
Micro-payments are not a bad idea and it has occasionally been put into practice, but not very widespread. No one has really pioneered an effective system for it.
Steele is also an advocate for “…Internet access and individual access to code is a human right, devising new rules for a sharing economy in which code is a cost of doing business at a fractional level in comparison to legacy proprietary code — between 1% and 10% of what is paid now.”
It is the ideal version of the Internet, where people are able to make money from their content and creations, users’ privacy is maintained, and ethics is essential are respected. The current trouble with YouTube channels and copyright comes to mind as does stolen information sold on the Dark Web and the desire to eradicate online bullying.
Whitney Grace, May 27, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Quotes to Note: The Thiel-Hulk Matter
May 26, 2016
The downsizing New York Times is channeling the Gawker thing. I read “Tech Billionaire in a Secret War with Gawker.” [Note: You may or may not be able to view this. Speak to the Gray Lady, not me.] The billionaire is Peter Thiel, a founder of PayPal and a number of other high profile and wildly successful companies. He is, I learned, a member of the PayPal mafia. Who knew?
I was not sure what a “demigod” was. I turned to Google. The first hit is this illustration apparently from a video game. Who knew?
I am not interested in the news story about a person who wants to fight for truth, justice, and the Silicon Valley way. I am not sure who Hulk Hogan is. That’s okay. The write up contained some quotes to note. I don’t want to lose track of these. I might want to spice up a report or a lecture with these allegedly accurate statements made by a powerful, rich wizard. Here you go:
- The story is not a story. It is a “bizarre and astounding back story.” [The New York Times] I once read similar headlines in the IGA store waiting for a human to check out my toothpaste and sparkling water purchases. Who published stories with these words? I think it was the National Enquirer.
- “I refuse to believe that journalism means massive privacy violations.”—Peter Thiel
- “We wanted flying cars, instead we got 140 characters,” is the Founders Fund tag line.—The New York Times quoting a Web site.
Great stuff. I wonder how Palantir Technologies, a company founded by Mr. Thiel, who is characterized as having “demigod status”, about the leaks to Buzzfeed. Should that reporter be concerned about legal action? I hope not.
Stephen E Arnold, May 26, 2016


