Startup Semantic Machines Scores Funding
February 26, 2016
A semantic startup looks poised for success with experienced executives and a hefty investment, we learn from “Artificial Intelligence Startup Semantic Machines Raises $12.3 Million” at VentureBeat. Backed by investors from Bain Capital Ventures and General Catalyst Partners, the enterprise focuses on deep learning and improved speech recognition. The write-up reveals:
“Last year, Semantic Machines named Larry Gillick as its chief technology officer. Gillick was previously chief speech scientist for Siri at Apple. Now Semantic Machines is looking to go further than Siri and other personal digital assistants currently on the market. ‘Semantic Machines is developing technology that goes beyond understanding commands, to understanding conversations,’ the startup says on its website. ‘Our Conversational AI represents a powerful new paradigm, enabling computers to communicate, collaborate, understand our goals, and accomplish tasks.’ The startup is building tools that third-party developers will be able to use.”
Launched in 2014, Semantic Machines is based in Newton, Massachusetts, with offices in Berkeley and Boston. The startup is also seeking to hire a few researchers and engineers, in case anyone is interested.
Cynthia Murrell, February 26, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
More Hacked US Voter Data Appears on the Dark Web
February 25, 2016
From HackRead comes a piece called More US Voters Data Circulating on the Dark Net, which points to the lack of protection surrounding data on US voters. This data was leaked on the site The Hell on Dark Web. No reports yet suggest how this data was hacked. While no social security numbers or highly sensitive information was released, records include name, date of birth, voter registration dates, voting records, political affiliation and address. Continuing the explanation of implications, the article’s author writes,
“However, it provides any professional hacker substantial information to initiate and plan a phishing attack in the next election which takes place in the US. Recent discoveries, news and speculations have exposed the role of nation-state actors and cyber criminals in planning, instigating and initiating hacking attacks aimed at maligning the upcoming US elections. While social media has emerged as one of the leading platforms adopted by politicians when they wish to spread a certain message or image, cyber criminals and non-state actors are also utilizing the online platform to plan and initiate their hacking attacks on the US election.”
As the article reminds us, this is the not first instance of voter records leaking. Such leaks call into question how this keeps happening and makes us wonder about any preventative measures. The last thing needed surrounding public perception of voting is that it puts one at risk for cyber attacks. Aren’t there already enough barriers in place to keep individuals from voting?
Megan Feil, February 25, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
monograph
Brown Dog Fetches Buried Data
February 25, 2016
Outdated file formats, particularly those with no metadata, are especially difficult to search and utilize. The National Science Foundation (NSF) reports on a new search engine designed to plumb the unstructured Web in, “Brown Dog: A Search Engine for the Other 99 Percent (ofData).” With the help of a $10 million award from the NSF, a team at the University of Illinois-based National Center for Supercomputing Application (NCSA) has developed two complementary services. Writer Aaron Dubrow explains:
“The first service, the Data Access Proxy (DAP), transforms unreadable files into readable ones by linking together a series of computing and translational operations behind the scenes. Similar to an Internet gateway, the configuration of the Data Access Proxy would be entered into a user’s machine settings and then forgotten. From then on, data requests over HTTP would first be examined by the proxy to determine if the native file format is readable on the client device. If not, the DAP would be called in the background to convert the file into the best possible format….
“The second tool, the Data Tilling Service (DTS), lets individuals search collections of data, possibly using an existing file to discover other similar files in the data. Once the machine and browser settings are configured, a search field will be appended to the browser where example files can be dropped in by the user. Doing so triggers the DTS to search the contents of all the files on a given site that are similar to the one provided by the use…. If the DTS encounters a file format it is unable to parse, it will use the Data Access Proxy to make the file accessible.”
See the article for more on these services, which NCSA’s Kenton McHenry likens to a DNS for data. Brown Dog conforms to NSF’s Data Infrastructure Building Blocks program, which supports development work that advances the field of data science.
Cynthia Murrell, February 25, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
No Evidence That Terrorists Are Using Bitcoin
February 23, 2016
If you were concerned virtual currencies like Bitcoin are making things easier for Islamic State (aka IS, ISIS, ISIL, or Daesh), you can rest easy, at least for now. The International Business Times reports, “Isis: Bitcoin Not Used by Daesh.” That is the conclusion reached by a Europol investigation performed after last November’s attacks in Paris. Though some had suggested the terrorists were being funded with cyber money, investigators found no evidence of it.
On the other hand, the organization’s communication networks are thriving online through the Dark Web and a variety of apps. Writer Alistair Charlton tells us:
Better known by European law enforcement is how terrorists like IS use social media to communicate. The report says: “The internet and social media are used for communication and the acquisition of goods (weapons, fake IDs) and services, made relatively safe for terrorists with the availability of secure and inherently encrypted appliances, such as WhatsApp, Skype and Viber. In Facebook, VKA and Twitter they join closed and hidden groups that can be accessed by invitation only, and use coded language.”
se of Tor, the anonymising browser used to access the dark web where sites are hidden from search engines like Google, is also acknowledged by Europol. “The use of encryption and anonymising tools prevent conventional observation by security authorities. There is evidence of a level of technical knowledge available to religiously inspired terrorist groups, allowing them to make their use of the internet and social media invisible to intelligence and law enforcement agencies.”
Of course, like any valuable technology, anonymizing apps can be used for weal or woe; they benefit marginalized peoples trying to make their voices heard as much as they do terrorists. Besides, there is no going back to a disconnected world now. My question is whether terrorists have taken the suggestion, and are now working on a Bitcoin initiative. I suppose we will see, eventually.
Cynthia Murrell, February 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Study Determines Sad News for People Who Look on Facebook “Likes” as Friendship
February 23, 2016
The article on Independent titled Facebook Friends Are Almost entirely Fake, Study Finds illuminates the cold, cold world of Facebook. According to the study, out of the hundreds of “friends” accumulated on Facebook, typically only about four are true blue buds. Most of them are not interested in your life or sympathetic to your problems. 2% are actively trying to stab you in the back. I may have made up the last figure, but you get the picture. The article tells us,
“The average person studied had around 150 Facebook friends. But only about 14 of them would express sympathy in the event of anything going wrong. The average person said that only about 27 per cent of their Facebook friends were genuine. Those numbers are mostly similar to how friendships work in real life, the research said. But the huge number of supposed friends on a friend list means that people can be tricked into thinking that they might have more close friends.”
This is particularly bad news considering how Facebook has opened the gates to all populations meaning that most people have family members on the site in addition to friends. Aunt Mary may have knit you a sweater for Christmas, but she really isn’t interested in your status update about running into your ex and his new girlfriend. If this article teaches us anything, it’s that you should look offline for your real relationships.
Chelsea Kerwin, February 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Pros and Cons of Data Silos When It Comes to Data Analysis and Management
February 22, 2016
The article on Informatica Blog titled Data Silos Are the Death of Analytics. Here’s the Fix explores the often overlooked need for a thorough data management vision and strategy at any competitive business. The article is plugging for an eBook guide to data analytics, but it does go into some detail on the early stages of streamlining the data management approach, summarized by the advice to avoid data silos. The article explains,
“It’s vital to pursue a data management architecture that works across any type of data, BI tool, or storage technology. If the move to add Hadoop or NoSQL demands entirely different tools to manage the data, you’re at risk of creating another silo…When you’ve got different tools for your traditional data warehouse versus your cloud setup, and therefore different skill sets to hire for, train for, and maintain, you’re looking at a real mess.”
The suggestions for streamlined processes and analysis certainly make sense, but the article does not defend the reasonable purposes of data silos, such as power, control, and secrecy. Nor do they consider that in some cases a firm is required to create data silos to comply with a government contract. But it is a nice thought: one big collection of data, one comprehensive data strategy. Maybe.
Chelsea Kerwin, February 22, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Print and Digital: Both Goners
February 20, 2016
I read in McPaper this article: “Wolff: Print’s Dead — but So Is Digital.” Okay, I learned from Dr. Francis Chivers (Duquesne University professor in the 1960s) that God is dead. I learned from Francis Fukuyama (assorted universities) that history is dead. Now I learn from McPaper that print and digital are dead. A two’fer! That is what makes McPaper so darned compelling.
The article informed me:
the effort to compete with native digital news outlets like BuzzFeed means traditional news organizations, with traditional share price values, must, like the venture-capital supported natives, pay more for traffic than can ever hope to be made back from advertisers. In this model, the digital natives can yet hope to sell to deep-pocket buyers, whereas the traditionals can only go out of business.
Where does McPaper land in this business scenario?
I noted this passage and its nod to the recently acquired yellow orange newspaper, the Financial Times:
At present, the FT concludes, there is no viable economic model for a written news product. Hence, in some ever-increasing existential darkness, it’s back to the drawing board in search of one.
Question: How many trips to the drawing board do traditional newspaper publishers get to make? I thought the digital revolution kicked off 40 or 50 years ago. I wonder if the drawing board is okay, but the folks visiting it are in a digital version of Sartre’s No Exit.
Well, well, I dare say one gets used to it in time.
Stephen E Arnold, February 20, 2016
Hobbit: Not Palantir Hobbits
February 19, 2016
I read “Hobbit—First Deliverables and Online Presence.” The news item reminded me that a European consortium “aims to develop a holistic benchmarking platform for big linked data and corresponding industry grade benchmarks.” The article pointed out an open benchmarking platform to evaluate the performance of state of the art systems on standardized hardware. To learn more about this European initiative navigate to this link. Will vendors participate so that meaningful performance data become available? That’s the hope.
Stephen E Arnold, February 19, 2016
Recommind Enables Easier Oversight into E-Discovery for Legal Industry
February 19, 2016
A recent article, entitled Recommind Adds Muscle to Cloud e-Discovery from CMS Wire, highlights an upgrade to Recommind’s Axcelerate e-discovery platform. This information intelligence and governance provider for the legal industry has upped their offering by adding a new efficiency scoring feature to enable “extensive visibility into the overall e-discovery review process.” Recommind make the updated based on polling their clients and finding 80 percent do not have oversight in regards to the technological competency of their outside counsel:
“Citing the same survey, he added that 72 percent of respondents pointed to insufficient visibility into the discovery practices of their outside counsel — legal professionals working with them but outside the firm — as a major concern. Axcelerate Cloud also eliminates the cost unpredictability that arises with traditional hosting charges with cloud-based e-discovery tools providers and the infrastructure maintenance required for on-premises solutions.”
When insights from big data is what a company is after, stronger cloud-based functionality is often the first step. Reminds us of enterprise search firm Autonomy which was eventually sold to HP. What will be next for Recommind?
Megan Feil, February 19, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
I Left My NoSQL Heart at the MarkLogic Conference
February 18, 2016
MarkLogic is a headlining company in the field of NoSQL enterprise databases, allowing companies to process, search, scale through massive data stores as well as build Web applications to handle the onslaught. As a respected enterprise leader, MarkLogic occasionally holds a conference to teach IT professionals as well as potential customers about its software benefits. This year MarkLogic will host the MarkLogic World 2016 US in San Francisco, California from May 9-12 at the Park Central Hotel.
The conference is described as:
“We kick the week off on Monday with three different hands-on workshops to choose from and end our week Thursday afternoon with our traditional closing keynote with our Founder and Chief Architect, Christopher Lindblad. New this year, we are including a special Partner Track, exclusive to MarkLogic partners and those interested in becoming one. If you are developing with MarkLogic, transitioning from RDBMS to MarkLogic, building apps on MarkLogic, or if you are just starting out on MarkLogic, this is the event for you. Sessions span from MarkLogic basics to technical deep dives covering data modeling, semantics, much & more.”
A Partner Track? That is a new feature at the MarkLogic convention, but what is its purpose? Will it be a daylong event where MarkLogic partners advertise their services or wares otherwise known as a commercial seminar without a free lunch? Will it be an informative explanation about how MarkLogic partners are shaping the NoSQL enterprise industry and combining their talents to advance the field? Maybe it is just a mix and mingle for networking?
The only way to know is to sign up for the conference and if you use the promo code “MLEMJAN” you can get in for free. It is also an excuse to visit San Francisco and ride the cable cars.
Whitney Grace, February 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph