Customize Your News with Semantic Search

January 28, 2016

There are many apps available that can aggregate news stories that cater to your interests: Feedly, Google News, Pulp, and other RSS feeders.  While these apps have their strengths and weaknesses, one question you need to ask is: do they use semantic search?  If you want a news app designed specifically to bring you news stories using semantic search there is “Algo: Semantic Search Engine For Customizable News” and it can be purchased on iTunes.

SkyGrid developed Algo and Apple named it a “Best News App”.  It has earned a 4.5 star rating.  Algo was designed to keep users up-to-date on news, follow topics of interest, and your favorite publications to create your own personalized newspaper.

Algo is described as:

“The only true real-time news aggregator. Simple, fast, and reliable, Algo is the only place to follow all of your favorite topics and interests. Search for anything you want! From people to TV shows to companies to finance, follow your interests on Algo. Set notifications for each topic and be notified as information updates in real-time.”

Other Algo features are ability to share articles on any service, save favorite articles, notification settings, and up-to-date news in real time.  Algo’s reliance on semantic search is one of the reasons why it has gained such favor with Apple and iTunes users.

 

Whitney Grace, January 28, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Palantir: Revenue Distribution

January 27, 2016

I came across a write up in a Chinese blog about Palantir. You can find the original text at this link. I have no idea if the information are accurate, but I had not seen this breakdown before:

image

The chart from “Touchweb” shows that in FY 2015 privately held Palantir derives 71 percent of its revenue from commercial clients.

The report then lists the lines of business which the company offers. Again this was information I had not previously seen:

Energy, disaster recovery, consumer goods, and card services

  • Retail, pharmaceuticals, media, and insurance
  • Audit, legal prosecution
  • Cyber security, banking
  • Healthcare research
  • Local law enforcement, finance
  • Counter terrorism, war fighting, special forces.

Because Palantir is privately held, there is not solid, audited data available to folks in Kentucky at this time.

Nevertheless, the important point is that the Palantir search and content processing platform has a hefty valuation, lots of venture financing, and what appears to be a diversified book of business.

Stephen E Arnold, January 27, 2016

Cheerleading for the SAS Text Exploration Framework

January 27, 2016

SAS is a stalwart in the number crunching world. I visualize the company’s executives chatting among themselves about the Big Data revolution, the text mining epoch, and the predictive analytics juggernaut.

Well, SAS is now tapping that staff interaction.

Navigate to “To Data Scientists and Beyond! One of Many Applications of Text Analytics.” There is an explanation of the ease of use of SAS. Okay, but my recollection was that I had to hire a PhD in statistics from Cornell University to chase down the code which was slowing our survivability analyses to meander instead of trot.

I learned:

One of the misconceptions I often see is the expectation that it takes a data scientist, or at least an advanced degree in analytics, to work with text analytics products. That is not the case. If you can type a search into a Google toolbar, you can get value from text analytics.

The write up contains a screenshot too. Where did the text analytics plumbing come from? Perchance an acquisition in 2008 like the canny purchase Teragram’s late 1990s technology?

The write up focuses on law enforcement and intelligence applications of text analytics. I find that interesting because Palantir is allegedly deriving more than 60 percent of the firm’s revenue from commercial customers like JP Morgan and starting to get some traction in health care.

Check out the screenshot. That is worth 1,000 words. SAS has been working on the interface thing to some benefit.

Stephen E Arnold, January 27, 2016

Microsoft: Deep Learning Freebie

January 27, 2016

Every big out in the money collecting biz wants to give away smart software tools. A trend methinks. Navigate to “Microsoft Releases CNTK, Its Open Source Deep Learning Toolkit, on GitHub.” The write up reveals:

In internal tests, Huang said CNTK has proved more efficient  than four other popular computational toolkits that developers use to create deep learning models for things like speech and image recognition, because it has better communication capabilities. “The CNTK toolkit is just insanely more efficient than anything we have ever seen,” Huang [Microsoft wizard] said.

Who would not believe this? A person struggling to get the new Surface to work? An individual bedeviled by Windows 10 nag screens? A hapless corporate information technology person trying to recover a corrupted PowerPoint from Microsoft’s cloud service? A Bing user trying to figure out where the shopping side of the world’s best search system for Yahooligans is hiding?

The write up also asserted:

Huang said it was important for his team to be able to address Microsoft’s internal needs with a tool like CNTK, but they also want to provide the same resources to other researchers who are making similar advances in deep learning. That’s why they decided to make the tools available via open source licenses to other researchers and developers.

Absolutely. Google gives away Chromebooks and Microsoft gives away its smart software tools. Altruism, your time has come.

Stephen E Arnold, January 26, 2016

 

 

Trust and Security Lessons Offered by the Dark Web

January 27, 2016

Spreading lessons about trust is not what most people think when they think of the drug dealers, hackers and cyber criminals of the Dark Web, but an article from Medium begs to differ. Let’s hear it for the bad guys: What the Dark Web can teach us about trust focuses on the idea that these “bad guys” are successfully and efficiently making transactions, ultimately based on trust. The article states:

“Crucially, they offer the same kind of reliability of experience rather than ripping people off, thus creating a sustainable business model. Transactions are made using digital currency Bitcoin and are recorded and verified through a distributed public ledger called the block chain. In this way, such sites build trust by offering a straightforward transaction built on transparency, albeit achieved with complete anonymity.”

This trust may be seen as missing from many internet sites where collection of personal data is the price of admission; the Dark Web offers an alternative with the promise of information not being tracked. Ironically, the issue of information being collected, albeit through other means, and sold through channels in the Dark Web means the problem of security is not eradicated.

 

Megan Feil, January 27, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Beware: Spyware Disguised as Search

January 27, 2016

Do you know how when you type an incorrect Web address into the search bar and you are redirected to a search page saying it could not find the address?  According to PCRisk one of these redirected pages could mean you serious harm, “Snjsearch.com Redirect.”  If you have ever heard of snjsearch.com, you should get off the page as quickly as possible.

Snjsearch masquerades as a legitimate Internet search engine with more relevant results than Google.  However, this is a false claim!  The Snjsearch.com developers include spyware within an installation packet to track browsing history and other sensitive information.

The biggest question you are probably asking is how snjsearch.com gets installed on your computer?

“This deceptive website is promoted as a ‘bundle’ with other software. The developers know that many users do not pay enough attention when downloading and installing software. Therefore, bundled applications (or in this case, modification of browser settings) are usually concealed within the ‘Custom/Advanced’ settings. Many users rush these processes and skip virtually all steps, leading to inadvertent installation of potentially unwanted programs. This exposes their systems to risk of further infection and compromises their privacy.”

The easiest way to avoid downloading snjsearch.com is to monitor all downloads, making sure that snjsearch.com is not included in an installation bundle.  Another preventive measure would be to know where you download an item.  Remember the saying, “don’t take candy from strangers”?  Well, do not take free downloads from strange Web sites.

If you believe you have snjsearch.com on your computer, the article contains steps to remove it.  If you are a curious person, do not experiment with snjsearch.com unless appropriate precautions are taken; namely, using a separate, non-work computing device not connected to an office or work related network.

 

Whitney Grace, January 27, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Unogs: A Third Party Netflix Search

January 26, 2016

My wife loves Netflix. She finds programs that strike me as a bit fanciful, but that’s okay. How do she, her friends, and millions of other people locate just the right video confection for snowmageddon weekend?

Not with the Netflix search and recommendation as far as I know. I dabbled with this service a couple of times and formed two opinions:

  • The folks have a lot of work to do in basic findability
  • The interface is not my cup of hot chocolate. (If you love that Netflix search system, have at it. I still read.)

image

An alternative seems to be available if the information in “This Site Lets You Search the Worldwide Netflix Library” is on the money. I learned one can use Unogs. Here’s some color:

The “unofficial Netflix online Global Search” (uNoGS) takes most of the guesswork out of the process: it lets you search by movie or actor, narrow the results by a few extra fields, and then spits out what movies are available in which countries. From there, users just need to use one of many cheap VPN services, fake the correct country, and let the back episodes of Doctor Who trickle in. The site is also a wealth of data on which countries have the best and worst libraries, and what VPNs give access to which countries. According to an interview with TorrentFreak, the site’s creator ‘Brian’ initially created the site solely for his own personal use, before putting it online last year.

Keep those brain cells in idle mode. Gobble the videos, gentle reader. Some of the large online outfits really covet people who find video consumption more fun that reading the works of James Clerk Maxwell.

Stephen E Arnold, January 27, 2016

Shodan: Web Cam Search Engine

January 26, 2016

When snowmageddon hit the DC area, I thought it would be amusing to check out some of the streets which once enchanted me. Alas. The webcams were not working particularly well.

I poked around and located a couple of functioning devices. Just as I figured. Quite a mess, but it is Washington, DC. A fine, well organized place.

Get ready for the next snowpocalype. Navigate to “Shodan Search Engine Provides Access to Hundreds of Unsecured Webcams.” The write up describes how the unsecured webcam search engine finds unsecured webcams. The system may prove interesting to those explore.

I learned:

The new feed consists of webcams that stream video, have an open port, and don’t require any authentication, which is how Shodan is able to snap screenshots in the first place. These webcams all employ the Real Time Streaming Protocol (RTSP)  on port 554, which is what makes them so easy to discover.

Shodan is at https://www.shodan.io/. I put tape over my computer’s video thingies. Just a thought for you to consider.

Stephen E Arnold, January 26, 2016

Pearson: Revenue Challenges and Digital Initiatives

January 26, 2016

I used to follow Pearson when it owned a wax museum and a number of other fascinating big revenue opportunities. Today the company is still big:  $8 billion in revenue, 40,000 employees, and offices in 70 countries. (Lots of reasons for senior executives to do field trips I assume.)

I noted that that Pearson plans to RIF (reduce in force) 4,000 employees. Let’s see. Yep, that works out to 10 percent of the “team.” Without the wax museum as a job option, will these folks become entrepreneurs?

I read “Turning Digital Learning Into Intellectual Property.” The title snagged me, and I assume that some of the 4,000 folks now preparing to find their future elsewhere were intrigued.

The write up reported:

Pearson is also positioning itself as a major center for the analysis of educational big data.

Ah, ha. A publishing outfit involved in education is getting with the Big Data thing.

How is a traditional publishing company going to respond to the digital opportunities it now perceives?

big data analysis methods will enable researchers to “capture stream or trace data from learners’ interactions” with learning materials, detect “new patterns that may provide evidence about learning,” and “more clearly understand the micro-patterns of teaching and learning by individuals and groups.” Big data methods of pattern recognition are at the heart of its activities, and Pearson ambitiously aims to use pattern recognition to identify generalizable insights into learning processes not just at the level of the individual learner but at vast scale.

Yes, vast. Micro patterns. Big Data.

My mouth is watering and my ageing brain cells hunger for the new learning.

Big questions have to be answered. For example, who owns learning theory?

I recall my brush with the education department. Ugly. I thought that most of the information to which I was exposed was baloney. For evidence, I think back to my years in Brazil with my hit and miss involvement with the Calvert Course, the “English not spoken here” approach of the schools in Campinas, and the seamless transition I made back to my “regular” US school after having done zero in the learning aquaria for several years.

I also recall the look of befuddlement on the face of the check out clerks, when I point out that a cash register tally is incorrect or the consternation that furrows the brow when I provide bills and two pennies.

My hunch is that the education thing is a juicy business, but I am not confident in Pearson’s ability to catch up with the folks who are not saddled with the rich legacy of printing books and charging lots of money for them.

This is a trend worth watching. Will it become the success of Ebsco’s “discovery” system? Will it generate the payoff Thomson Reuters is getting by reselling Palantir? Will it allow Pearson to make the bold moves that so many traditional publishing companies have made after they embraced XML as the silver bullet and incantation to ward off collapsing revenues?

I for one will be watching. Who knows? Maybe I will return to school to brighten the day of an adjunct professor at the local university. (This institution I might add is struggling with FBI investigations, allegations of sexual misconduct, and a miasma of desperation.)

Education. Great stuff.

Stephen E Arnold, January 26, 2016

Cybercrime as a Service Drives Cyber Attacks on Uber Accounts and More

January 26, 2016

Several articles lately have shined light on the dynamics at play in the cybercriminal marketplaces of the Dark Web; How much is your Uber account worth?, for example, was recently published on Daily Mail. Summarizing a report from security researchers at Trend Micro for CNBC, the article explains this new information extends the research previously done by Intel Security’s The Hidden Data Economy report. Beyond describing the value hierarchy where Uber and Paypal logins cost more than social security numbers and credit cards, this article shares insights on the bigger picture,

“’Like any unregulated, efficient economy, the cybercrime ecosystem has quickly evolved to deliver many tools and services to anyone aspiring to criminal behavior,’ said Raj Samani, chief technology officer for Intel Security EMEA. ‘This “cybercrime-as-a-service” marketplace has been a primary driver for the explosion in the size, frequency, and severity of cyber attacks.

‘The same can be said for the proliferation of business models established to sell stolen data and make cybercrime pay.’”

Moving past the shock value of the going rates, this article draws our attention to the burgeoning business of cybercrime. Similarly to the idea that Google has expanded the online ecosystem by serving as a connector, it appears marketplaces in the Dark Web may be carving out a similar position. Quite the implications when you consider the size of the Dark Web.

 

Megan Feil, January 26, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta