Watson Speaks Naturally
September 3, 2015
While there are many companies that offer accurate natural language comprehension software, completely understanding the complexities of human language still eludes computers. IBM reports that it is close to overcoming the natural language barriers with IBM Watson Content Analytics as described in “Discover And Use Real-World Terminology With IBM Watson Content Analytics.”
The tutorial points out that any analytics program that only relies on structured data loses about four fifths of information, which is a big disadvantage in the big data era, especially when insights are supposed to be hidden in the unstructured. The Watson Content Analytics is a search and analytics platform and it uses rich-text analysis to find extract actionable insights from new sources, such as email, social media, Web content, and databases.
The Watson Content Analytics can be used in two ways:
- “Immediately use WCA analytics views to derive quick insights from sizeable collections of contents. These views often operate on facets. Facets are significant aspects of the documents that are derived from either metadata that is already structured (for example, date, author, tags) or from concepts that are extracted from textual content.
- Extracting entities or concepts, for use by WCA analytics view or other downstream solutions. Typical examples include mining physician or lab analysis reports to populate patient records, extracting named entities and relationships to feed investigation software, or defining a typology of sentiments that are expressed on social networks to improve statistical analysis of consumer behavior.”
The tutorial runs through a domain specific terminology application for the Watson Content Analytics. The application gets very intensive, but it teaches how Watson Content Analytics is possibly beyond the regular big data application.
Whitney Grace, September 3, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Oracle Suggests a PeopleSoft Upgrade
September 2, 2015
PeopleSoft is a popular human resources management software and like all software it occasionally needs to be upgraded. TriCore Solutions suggests that instead of using Verity, your next upgrade to PeopleSoft should be the Oracle Secure Enterprise Search (SES). TriCore Solutions brags about helping clients upgrade to SES in the article, “Oracle Secure Enterprise Search (SES) And PeopleSoft 9.2.”
Oracle SES offers a secure, high-quality search across all enterprise platforms as well as analytics, intuitive search interface, secure crawling, indexing, and searching. When SES is deployed into an enterprise system it also offers several key capabilities:
- “Connectivity to Legacy Repositories. SES allows companies to access their most valuable assets – information about its specific business, its processes, products, customers, and documents that previously resided in proprietary repositories. Connectors include interfaces for EMC Documentum, Microsoft SharePoint, IBM Lotus Notes, Oracle‘s E-Business Suite and Oracle Siebel among others.
- Security: The ability to search password protected sources securely. Oracle‘s search technology provides single-sign-on (SSO) based security where available, and can also employ application-specific security where SSO is not available.
- High quality search results: Brings for the Intranet a high level of relevance that users associate with Internet searches.
- Going beyond keywords. As the volume of information grows, users need advanced search techniques like the ability to categorize and cluster search results for iterative navigation.”
It is evident that Oracle SES offers a comprehensive search feature to PeopleSoft and maybe a better product, but what does Verity have to offer?
Whitney Grace, September 2, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Forbes Bitten by Sci-Fi Bug
September 1, 2015
The article titled Semantic Technology: Building the HAL 9000 Computer on Forbes runs with the gossip from the Smart Data Conference this year. Namely, that semantic technology has finally landed. The article examines several leaders of the field including Maana, Loop AI Labs and Blazegraph. The article mentions,
“Computers still can’t truly understand human language, but they can make sense out of certain aspects of textual content. For example, Lexalytics (www.lexalytics.com) is able to perform sentiment analysis, entity extraction, and ambiguity resolution. Sentiment analysis can determine whether some text – a tweet, say, expresses a positive or negative opinion, and how strong that opinion is. Entity extraction identifies what a paragraph is actually talking about, while ambiguity resolution solves problems like the Paris Hilton one above.”
(The “Paris Hilton problem” referred to is distinguishing between the hotel and the person in semantic search.) In spite of the excitable tone of the article’s title, its conclusion is much more measured. HAL, the sentient computer from 2001: A Space Odyssey, remains in our imaginations. In spite of the exciting work being done, the article reminds us that even Watson, IBM’s supercomputer, is still without the “curiosity or reasoning skills of any two-year-old human.” For the more paranoid among us, this might be good news.
Chelsea Kerwin, September 1, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Bank Exports IT to India
September 1, 2015
Computer World’s article, “As It Sets IT Layoffs, Citizens Bank Shifts Work To India Via Web” sounds like it should have been published five years ago. It was not that long ago when Americans were in an uproar about jobs being outsourced to China and India, but many of those jobs have returned to the US or replaced with an alternative. Despite falling out of interest with the mainstream media, jobs are still being outsourced to Asia. Citizens Bank is having their current IT employees train their replacements in a “knowledge transfer” and they will be terminated come December.
Citizens Bank signed a five-year services contract with IBM for IT services. IBM owns a large scale IT services company in India, which pays its workers a fraction of the current Citizens Bank IT workers.
As one can imagine, the Citizens Bank employees are in an uproar:
“The number of layoffs is in dispute. Employees said as many as 150 Citizen Bank IT workers were being laid off. But this number doesn’t include contractors. IBM will be consolidating the bank’s IT infrastructure services, and, as part of that, the bank is consolidating from four vendors to one vendor, IBM. This change will result in the elimination of some contractor jobs, and when contractors are added, the total layoff estimate by employees ranges from 250 to 350.”
It is reported that some IT workers are being offered comparable positions with IBM, while others are first in line for jobs in other branches of Citizens Bank. However, the IBM jobs appear to be short term and the other bank jobs do not appear to be turning up.
Other companies are shifting their IT work overseas much to the displeasure of IT workers, who thought they would be assured job security for the rest of their lives. IT workers place the blame on companies wanting to increase profits and not caring about their employees. What is going on with Citizens Bank and other companies is not new. It has been going on for decades, but that does not make the harm to Americans any less.
Whitney Grace, September 1, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Compare Trump to Lincoln with Watson Personality Insights
August 19, 2015
IBM’s Watson is employing its capabilities in a new and interesting way: BoingBoing asks, “What Does Your Writing Say About You? IBM Watson Personality Insights Will Tell You.” The software derives cognitive and social characteristics about people from their writings, using linguistic analytics. I never thought I’d see a direct, graphically represented comparison between speeches of Donald Trump and Abe Lincoln, but there it is. There are actually some similarities; they’re both businessmen turned politicians, after all. Reporter Andrea James shares Watson’s take on Trump’s “We Need Brain” speech from the recent Republican primary debate:
“You are a bit dependent, somewhat verbose and boisterous. You are susceptible to stress: you are easily overwhelmed in stressful situations. You are emotionally aware: you are aware of your feelings and how to express them. And you are prone to worry: you tend to worry about things that might happen. Your choices are driven by a desire for efficiency. You consider both independence and helping others to guide a large part of what you do. You like to set your own goals to decide how to best achieve them. And you think it is important to take care of the people around you.”
For comparison, see the write-up for the analysis of Lincoln’s Gettysburg Address (rest assured, Lincoln does come out looking better than Trump). The article also supplies this link, where you can submit between 3500 and 6000 words for Watson’s psychoanalysis; as James notes, you can submit writing penned by yourself, a friend, or an enemy (or some random blogger, perhaps.) To investigate the software’s methodology, click here.
Cynthia Murrell, August 19, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
How to Use Watson
August 17, 2015
While there are many possibilities for cognitive computing, what makes an idea a reality is its feasibility and real life application. The Platform explores “The Real Trouble With Cognitive Computing” and the troubles IBM had (has) trying to figure out what they are going to do with the supercomputer they made. The article explains that before Watson became a Jeopardy celebrity, the IBM folks came up 8,000 potential experiments for Watson to do, but only 20 percent of them.
The range is small due to many factors, including bug testing, gauging progress with fuzzy outputs, playing around with algorithmic interactions, testing in isolation, and more. This leads to the “messy” way to develop the experiments. Ideally, developers would have a big knowledge model and be able to query it, but that option does not exist. The messy way involves keeping data sources intact, natural language processing, machine learning, and knowledge representation, and then distributed on an infrastructure.
Here is another key point that makes clear sense:
“The big issue with the Watson development cycle too is that teams are not just solving problems for one particular area. Rather, they have to create generalizable applications, which means what might be good for healthcare, for instance, might not be a good fit—and in fact even be damaging to—an area like financial services. The push and pull and tradeoff of the development cycle is therefore always hindered by this—and is the key barrier for companies any smaller than an IBM, Google, Microsoft, and other giants.”
This is exactly correct! Engineering is not the same as healthcare and it not all computer algorithms transfer over to different industries. One thing to keep in mind is that you can apply different methods from other industries and come up with new methods or solutions.
Whitney Grace, August 18, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Open Source Tools for IBM i2
August 17, 2015
IBM has made available two open source repositories for the IBM i2 intelligence platform: the Data-Acquisition-Accelerators and Intelligence-Analysis-Platform can both be found on the IBM-i2 page at GitHub. The IBM i2 suite of products includes many parts that work together to give law enforcement, intelligence organizations, and the military powerful data analysis capabilities. For an glimpse of what these products can do, we recommend checking out the videos at the IBM i2 Analyst’s Notebook page. (You may have to refresh the page before the videos will play.)
The Analyst’s Notebook is but one piece, of course. For the suite’s full description, I turned to the product page, IBM i2 Intelligence Analysis Platform V3.0.11. The Highlights summary describes:
“The IBM i2 Intelligence Analysis product portfolio comprises a suite of products specifically designed to bring clarity through the analysis of the mass of information available to complex investigations and scenarios to help enable analysts, investigators, and the wider operational team to identify, investigate, and uncover connections, patterns, and relationships hidden within high-volume, multi-source data to create and disseminate intelligence products in real time. The offerings target law enforcement, defense, government agencies, and private sector businesses to help them maximize the value of the mass of information that they collect to discover and disseminate actionable intelligence to help them in their pursuit of predicting, disrupting, and preventing criminal, terrorist, and fraudulent activities.”
The description goes on to summarize each piece, from the Intelligence Analysis Platform to the Information Exchange Visualizer. I recommend readers check out this page, and, especially, the videos mentioned above for better understanding of this software’s capabilities. It is an eye-opening experience.
Cynthia Murrell, August 18, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
How to Use Watson
August 7, 2015
While there are many possibilities for cognitive computing, what makes an idea a reality is its feasibility and real life application. The Platform explores “The Real Trouble With Cognitive Computing” and the troubles IBM had (has) trying to figure out what they are going to do with the supercomputer they made. The article explains that before Watson became a Jeopardy celebrity, the IBM folks came up 8,000 potential experiments for Watson to do, but only 20 percent of them.
The range is small due to many factors, including bug testing, gauging progress with fuzzy outputs, playing around with algorithmic interactions, testing in isolation, and more. This leads to the “messy” way to develop the experiments. Ideally, developers would have a big knowledge model and be able to query it, but that option does not exist. The messy way involves keeping data sources intact, natural language processing, machine learning, and knowledge representation, and then distributed on an infrastructure.
Here is another key point that makes clear sense:
“The big issue with the Watson development cycle too is that teams are not just solving problems for one particular area. Rather, they have to create generalizable applications, which means what might be good for healthcare, for instance, might not be a good fit—and in fact even be damaging to—an area like financial services. The push and pull and tradeoff of the development cycle is therefore always hindered by this—and is the key barrier for companies any smaller than an IBM, Google, Microsoft, and other giants.”
This is exactly correct! Engineering is not the same as healthcare and it not all computer algorithms transfer over to different industries. One thing to keep in mind is that you can apply different methods from other industries and come up with new methods or solutions.
Whitney Grace, August 7, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Hire Watson As Your New Dietitian
August 4, 2015
IBM’s supercomputer Watson is being “trained” in various fields, such as healthcare, app creation, customer service relations, and creating brand new recipes. The applications for Watson are possibly endless. The supercomputer is combining its “skills” from healthcare and recipes by trying its hand at nutrition. Welltok invented the CaféWell Health Optimization Platform, a PaaS that creates individualized healthcare plans, and it implemented Watson’s big data capabilities to its Healthy Dining CaféWell personal concierge app. eWeek explains that “Welltok Takes IBM Watson Out To Dinner,” so it can offer clients personalized restaurant menu choices.
” ‘Optimal nutrition is one of the most significant factors in preventing and reversing the majority of our nation’s health conditions, like diabetes, overweight and obesity, heart disease and stroke and Alzheimer’s,’ said Anita Jones-Mueller, president of Healthy Dining, in a statement. ‘Since most Americans eat away from home an average of five times each week and it can be almost impossible to know what to order at restaurants to meet specific health needs, it is very important that wellness and condition management programs empower smart dining out choices. We applaud Welltok’s leadership in providing a new dimension to healthy restaurant dining through its groundbreaking CaféWell Concierge app.’”
Restaurant menus are very vague when it comes to nutritional information. When it comes to knowing if something is gluten-free, spicy, or a vegetarian option, the menu will state it, but all other information is missing. In order to find a restaurant’s nutritional information, you have to hit the Internet and conduct research. A new law passed will force restaurants to post calorie counts, but that will not include the amount of sugar, sodium, and other information. People have been making poor eating choices, partially due to the lack of information, if they know what they are eating they can improve their health. If Watson’s abilities can decrease the US’s waistline, it is for the better. The bigger challenge would be to get people to use the information.
Whitney Grace, August 4, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
A Technical Shift in Banking Security
July 23, 2015
Banks may soon transition from asking for your mother’s maiden name to tracking your physical behavior in the name of keeping you (and their assets) safe. IT ProPortal examines “Fraud Prevention: Knowledge-Based Ananlytics in Steep Decline.” Writer Lara Lackie cites a recent report from the Aite Group that indicates a shift from knowledge-based analytics to behavioral analytics for virtual security checkpoints. Apparently, “behavioral analytics” is basically biometrics without the legal implications. Lackie writes:
“Examples of behavioural analytics/biometrics can include the way someone types, holds their device or otherwise interacts with it. When combined, continuous behavioural analysis, and compiled behavioural biometric data, deliver far more intelligence than traditionally available without interrupting the user’s experience….
Julie Conroy, research director, Aite Group, said in the report “When the biometric is paired with strong device authentication, it is even more difficult to defeat. Many biometric solutions also include liveliness checks, to ensure it’s a human being on the other end.’
“NuData Security’s NuDetect online fraud engine, which uses continuous behavioural analysis and compiled behavioral biometric data, is able to predict fraud as early as 15 days before a fraud attempt is made. The early detection offered by NuDetect provides organisations the time to monitor, understand and prevent fraudulent transactions from taking place.”
The Aite report shows over half the banks surveyed plan to move away from traditional security questions over the next year, and six of the 19 institutions plan to enable mobile-banking biometrics by the end of this year. Proponents of the approach laud behavioral analytics as the height of fraud detection. Are Swype patterns and indicators of “liveliness” covered by privacy rights? That seems like a philosophical question to me.
Cynthia Murrell, July 23, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

