Machine Learning Hindsight

January 18, 2016

Have you ever found yourself saying, “If I only knew then, what I know now”?  It is a moment we all experience, but instead of stewing over our past mistakes it is better to share the lessons we’ve learned with others.  Data scientist Peadar Coyle learned some valuable lessons when he first started working with machine learning.  He discusses three main things he learned in the article, “Three Things I Wish I Knew Earlier About Machine Learning.”

Here are the three items he wishes he knew then about machine learning, but know now:

  • “Getting models into production is a lot more than just micro services
  • Feature selection and feature extraction are really hard to learn from a book
  • The evaluation phase is really important”

Developing models is an easy step, but putting them in production is difficult.  There are many major steps that need attending to and doing all of the little jobs isn’t feasible on huge projects.   Peadar recommends outsourcing when you can.  Books and online information are good reference tools, but when they cannot be applied to actual situations the knowledge is useless.  Paedar learned that real world experience has no comparison.  When it comes to testing, it is a very important thing.  Very much as real world experience is invaluable, so is the evaluation.  Life does not hand perfect datasets for experimentation and testing different situations will better evaluate the model.

Paedar’s advice applies to machine learning, but it applies more to life in general.

 

Whitney Grace, January 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Hello, Big Algorithms

January 15, 2016

The year had barely started and it looks lime we already have a new buzzword to nestle into our ears: big algorithms.  The term algorithm has been tossed around with big data as one of the driving forces behind powerful analytics.  Big data is an encompassing term that refers to privacy, security, search, analytics, organization, and more.  The real power, however, lies in the algorithms.  Benchtec posted the article, “Forget Big Data-It’s Time For Big Algorithms” to explain how algorithms are stealing the scene.

Data is useless unless you are able to are pull something out of it.  The only way get the meat off the bone is to use algorithms.  Algorithms might be the powerhouses behind big data, but they are not unique.  The individual data belonging to different companies.

“However, not everyone agrees that we’ve entered some kind of age of the algorithm.  Today competitive advantage is built on data, not algorithms or technology.  The same ideas and tools that are available to, say, Google are freely available to everyone via open source projects like Hadoop or Google’s own TensorFlow…infrastructure can be rented by the minute, and rather inexpensively, by any company in the world. But there is one difference.  Google’s data is theirs alone.”

Algorithms are ingrained in our daily lives from the apps run on smartphones to how retailers gather consumer detail.  Algorithms are a massive untapped market the article says.  One algorithm can be manipulated and implemented for different fields.  The article, however, ends on some socially conscious message about using algorithms for good not evil.  It is a good sentiment, but kind of forced here, but it does spur some thoughts about how algorithms can be used to study issues related to global epidemics, war, disease, food shortages, and the environment.

Whitney Grace, January 15, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Strong and Loud or Quiet and Weak, Googles Robot Grandkids Fail to Impress the Marines

January 15, 2016

The article titled Why the Marines Don’t Want Google’s Robot Soldiers in Combat on Fortune discusses the downside of the Google-owned company Boston Dynamics’ robots. You might guess, moral concerns, or more realistically, funding. But you would be wrong, since DARPA already shelled out over $30 million for the four-legged battle bots. Instead, the issue is that a single robot, which looks like a huge insect wearing a helmet and knee and elbow pads, emits a noise akin to a motorcycle revving, or a jackhammer drilling, for small movements. The article explains,

“Anyone who’s seen Boston Dynamics’ four-legged robots in action typically is wowed by their speed, strength, and agility, but also note how loud they are. They sound like chainsaws on steroids. And that decibel level is apparently a problem for potential customers, namely the U.S. military.

For Marines who took the robot out for a spin, that noise is apparently a deal breaker. “They took it as it was: a loud robot that’s going to give away their position.”

The reason for all this hullaballoo on the part of the robot is its gas engine, intended for increased robustness. The military was looking for a useful helpmate capable of carrying heavy loads of up to 400 lbs. There has been some back and forth between military representatives and Boston Dynamics, but the current state of affairs seems to be a quieter, and weaker, robot. Not ideal.

 
Chelsea Kerwin, January 15, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Advice for Marketers, Not Consumers, on the Present and Future States of Location Data Technology

January 14, 2016

The article on Mashable titled Location Data’s Dirty Secret: How Accuracy is Getting Lost in Today’s Data Shuffle relates the bad news for marketers, and hugely relieving news for paranoid consumers, that location data quality is far from precise. The money being funneled into location-targeted mobile ad revenues is only part of the picture, but it does illustrate the potential power of this technology for marketers, who want to know everything they can about shopping habits and habits in general. But they may be spending on useless data. In fact, the article states,

“Studies indicate that more than half of mobile location data is inaccurate. In fact, a report from the MMA offers a laundry list of variables that negatively impact location data quality. Culprits include a “lack of accuracy standards and market education,” “urban density,” “inaccurate interpretations” of location data that have been translated into a latitude/longitude coordinate and poor “data freshness.”

The article is largely optimistic that if marketers do a little research into the source of their locating data, they will know whether it can be trusted or not. That, and an objective third party will help marketers avoid big money-wasting mistakes. Must be nice to be a marketer instead of a consumer, the latter has little chance to avoid being a pawn followed around the chess board by her cell phone.

 

Chelsea Kerwin, January 14, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Feeding the Google AI Beast and Keeping in Mind, You Are What You Eat

January 13, 2016

The article titled We are All SkyNet in the Googlesphere on Disinformation refers to the Terminator’s controlling A.I., SkyNet, who determines the beginning of a machine age in the movie, and the conspiracy that Google is taking on that role in reality. Is it easy to understand the fear of Google’s reach, it does sometimes seem like a gigantic arm with a thousand hands groping about in cyberspace, and collecting little pieces of information that on their own seem largely harmless. The article discusses cloud computing and its relationship to the conspiracy,

“When you need your bits of info, your computer gathers them from the cloud again. The cloud is SkyNet’s greatest line of defense, as you can’t kill what is spread out over an entire network. Since the magnificent expose of the NSA and their ability to (at least) access every keystroke, file or phone call and Google’s (at minimum) complicity in managing the data, that is to say, nearly all data being collected, it’s hard to imagine the limitations to what any such Google AI program could learn.”

The article ends philosophically with the suggestion that the nature of a modern day SkyNet will depend on the data that it gathers from us, that we will create the monster in our likeness. This may not be where we expected the article to go, but it does make sense. Google as a company will not determine it, at least if literature has taught us anything.

 
Chelsea Kerwin, January 13, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There Is a Hole in the Cloud

January 11, 2016

Everyone is running to the cloud to reserve their own personal data spot.  Companies have migrated their services to the cloud to serve a growing mobile clientele.  If you are not on the cloud, it is like you’re still using an old flip phone.  The cloud is a viable and useful service that allows people to access their data anytime and anywhere.  Business Insider reveals that cloud usage is heavily concentrated in the US:  “Latest Data From The Valley’s Oldest VC Firm Shows One Big Flaw In The Hype Around The Cloud.”

Bessemer Venture Partners is the longest running venture capitalist company in Silicon Valley.  To celebrate its 100th cloud investment, it surveyed where the company’s cloud investments are located.  Seventy-six of the startups are in the US, eleven are in Israel, and four are in Canada.

“The fact that less than one-quarter of BVP’s cloud investments are in non-US startups shows the adoption of cloud technologies is lagging in the rest of the world. It’s also a reminder that, even after all these years of cloud hype, many countries are still concerned about some aspects of cloud technology.”

Cloud adoption around the world is slow due to the US invents a lot of new technology and the rest of the world must catch up.  Security is another big concern and companies are hesitant to store sensitive information on a system with issues.

The cloud has only been on the market for ten years and has only gained attention in the past five.  Cell phones, laptops, and using open source software took time to catch on as well.

Whitney Grace, January 11, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

IBMs CFO Reveals IBMs Innovation Strategy: Why Not Ask Watson

January 11, 2016

The article on TechTarget titled IBM CFO Schroeter on the Company’s Innovation Strategy delves into the mind of Martin Schroeter regarding IBM’s strategy for chasing innovation in healthcare and big data. This year alone IBM acquired three healthcare companies with data on roughly one hundred million people as well as massive amounts of data on medical conditions. Additionally, as the article relates,

“IBM’s purchase of The Weather Co.’s data processing and analytics operations brought the company a “massive ingestion machine,” which plays straight into its IoT strategy, Schroeter said. The ingestion system pulls in 4 GB of data per second, he said, and runs a lot of analytics as users generate weather forecasts for their geographies. The Weather Co. system will be the basis for the company’s Internet of Things platform, he said.”

One of many interesting tidbits from the mouth of Schroeter was this gem about companies being willing to “disrupt [themselves]” to ensure updated and long-term strategies that align technological advancement with business development. The hurtling pace of technology has even meant IBM coming up with a predictive system to speed up the due diligence process during acquisitions. What once took weeks to analyze and often lost IBM deals has now been streamlined to a single day’s work. Kaboom.

 

Chelsea Kerwin, January 11, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Glass 2: A Good Question

January 10, 2016

I read “Would You Wear Google Glass If It Looked Like This?” The “this” is a pair of Revenge of the Nerds glasses.

The answer from me from my redoubt in Harrod’s Creek, Kentucky is, “No.”

image

Why? I have a mobile phone which works just fine. When I do things, I want to concentrate on the task. I do not want to be distracted.

I had a pair of glasses like that in high school. Was I cool looking or what?

Stephen E Arnold, January 10, 2016

In Scientific Study Hierarchy Is Observed and Found Problematic to Cooperation

January 8, 2016

The article titled Hierarchy is Detrimental for Human Cooperation on Nature.Com Scientific Reports discusses the findings of scientists related to social dynamics in human behavior. The abstract explains in no uncertain terms that hierarchies cause problems among human groups. Perhaps surprisingly to many millennials, hierarchies actually forestall cooperation. The article explains the circumstances of the study,

“Participants competed to earn hierarchy positions and then could cooperate with another individual in the hierarchy by investing in a common effort. Cooperation was achieved if the combined investments exceeded a threshold, and the higher ranked individual distributed the spoils unless control was contested by the partner. Compared to a condition lacking hierarchy, cooperation declined in the presence of a hierarchy due to a decrease in investment by lower ranked individuals.”

The study goes on to explain that regardless of whether power or rank was earned or arbitrary (think boss vs. boss’s son), it was “detrimental to cooperation.” It also goes into great detail on how to achieve superior cooperation through partnership and without an underlying hierarchical structure. There are lessons to take away from this study in the many fields, and the article is mainly focused on economic metaphors, but what about search vendors? Organization does, after all, have value.

 
Chelsea Kerwin, January 8, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Search and Cultural Representation

January 6, 2016

Google Search has worked its way into our culture as an indispensable, and unquestioned, tool of modern life. However, the algorithms behind the platform have become more sophisticated, allowing Google to tinker more and more with search results. Since so many of us regularly use the search engine to interact with the outside world, Google’s choices (and ours) affect the world’s perception of itself. Researcher Safiya Umoja Noble details some of the adverse effects of this great power in her paper, “Google Search: Hyper-Visibility as a Means of Rendering Black Women and Girls Invisible,” posted at the University of Rochester’s InVisible Culture journal. Not surprisingly, commerce features prominently in the story. Noble writes:

“Google’s algorithmic practices of biasing information toward the interests of the powerful elites in the United States,14 while at the same time presenting its results as generated from objective factors, has resulted in a provision of information that perpetuates the characterizations of women and girls through misogynist and pornified websites. Stated another way, it can be argued that Google functions in the interests of its most influential (i.e. moneyed) advertisers or through an intersection of popular and commercial interests. Yet Google’s users think of it as a public resource, generally free from commercial interest15—this fact likely bolstered by Google’s own posturing as a company for whom the informal mantra, ‘Don’t be evil,’ has functioned as its motivational core. Further complicating the ability to contextualize Google’s results is the power of its social hegemony.16  At the heart of the public’s general understanding and trust in commercial search engines like Google, is a belief in the neutrality of technology … which only obscures our ability to understand the potency of misrepresentation that further marginalizes and renders the interests of Black women, coded as girls, invisible.”

Noble goes on to note ways we, the users, codify our existing biases through our very interaction with Google Search. To say the paper treats these topic in depth is an understatement. Noble provides enough background on the study of culture’s treatment of Black women and girls to get any non-social-scientist up to speed. Then, she describes the extension of that treatment onto the Web, and how certain commercial enterprises now depend on those damaging representations. Finally, the paper calls for a critical approach to search to address these, and similar, issues. It is an important, and informative, paper; we suggest interested readers give it a gander.

 

Cynthia Murrell, January 6, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta