Cybercrime to Come

December 2, 2015

Apparently, we haven’t seen anything yet. An article at Phys.org, “Kaspersky Boss Warns of Emerging Cybercrime Threats,” explain that personal devices and retail databases are just the beginning for cyber criminals. Their next focus has the potential to create more widespread chaos, according to comments from security expert Eugene Kaspersky. We learn:

“Russian online security specialist Eugene Kaspersky says cyber criminals will one day go for bigger targets than PCs and mobiles, sabotaging entire transport networks, electrical grids or financial systems. The online threat is growing fast with one in 20 computers running on Microsoft Windows already compromised, the founder and chief executive of security software company Kaspersky Lab told AFP this week on the sidelines of a cybersecurity conference in Monaco.”

The article also notes that hackers are constantly working to break every security advance, and that staying safe means more than installing the latest security software. Kaspersky noted:

“It’s like everyday life. If you just stay at home and if you don’t have visitors, you are quite safe. But if you like to walk around to any district of your city, you have to be aware of their street crimes. Same for the Internet.”

Kaspersky’s company, Kaspersky Lab, prides itself on its extensive knowledge of online security. Founded in 1997 and headquartered in Moscow, the company is one of the leading security firms in the world.

Cynthia Murrell, December 2, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Linguamatics Clears Copyright

December 1, 2015

What is a researcher’s dream?  A researcher’s dream is to be able to easily locate and access viable, full-text resources without having to deal with any copyright issues.  One might think that all information is accessible via the Internet and a Google search, but if this is how you think professional research happens then you are sadly mistaken.  Most professional articles and journals are locked behind corporate academic walls with barbed wire made from copyright laws.

PR Newswire says in “Linguamatics Expands Cloud Text Mining Platform To Include Full-Text Articles” as way for life science researchers to legally bypass copyright.  Linguamatics is a natural language processing text-mining platform and it will now incorporate the Copyright Clearance Center’s new text mining solution RightFind XML.  This will allow researchers to have access to over 4,000 peer-reviewed journals from over twenty-five of scientific, technical, and medical publishers.

“The solution enables researchers to make discoveries and connections that can only be found in full-text articles. All of the content is stored securely by CCC and is pre-authorized by publishers for commercial text mining. Users access the content using Linguamatics’ unique federated text mining architecture which allows researchers to find the key information to support business-critical decisions. The integrated solution is available now, and enables users to save time, reduce costs and help mitigate an organization’s copyright infringement risk.”

I can only hope that other academic databases and publishers will adopt a similar and (hopefully) more affordable way to access full-text, viable resources.  One of the biggest drawbacks to Internet research is having to rely on questionable source information, because it is free and readily available.  Easier access to more accurate information form viable resources will not only improve information, but also start a trend to increase its access.

Whitney Grace, December 1, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Redundant Dark Data

September 21, 2015

Have you heard the one about how dark data hides within an organization’s servers and holds potential business insights? Wait, you did not?  Then where have you been for the past three years?  Datameer posted an SEO heavy post on its blog called, “Shine Light On Dark Data.”  The post features the same redundant song and dance about how dark data retained on server has valuable customer trend and business patterns that can put them bring them out ahead of the competition.

One new fact is presented: IDC reports that 90% of digital data is dark.  That is a very interesting fact and spurs information specialists to action to get a big data plan in place, but then we are fed this tired explanation:

“This dark data may come in the form of machine or sensor logs that when analyzed help predict vacated real estate or customer time zones that may help businesses pinpoint when customers in a specific region prefer to engage with brands. While the value of these insights are very significant, setting foot into the world of dark data that is unstructured, untagged and untapped is daunting for both IT and business users.”

The post ends on some less than thorough advice to create an implementation plan.  There are other guides on the Internet that better prepare a person to create a big data action guide.  The post’s only purpose is to serve as a search engine bumper for Datameer.  While Datameer is one of the leading big data software providers, one would think they wouldn’t post a “dark data definition” post this late in the game.

Whitney Grace, September 21, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Solves CDN Problem with New Partnerships

September 21, 2015

The article on TechCrunch titled Google Partners with Cloudflare, Fastly, Level 3 and Highwinds to Help Developers Push Google Cloud Content to Users Faster discusses Google’s recent switch from it’s own content delivery network (CDN) (formerly PageSpeed service) to partner services. This has been advanced by the CDN Interconnect launch, purportedly aimed at providing simplified and less costly space for developers who use the cloud service for running applications. The article elucidates,

“Developers who use a CDN Interconnect partner to serve their content — and that’s mostly static assets like photos, music and video — are now eligible to pay a reduced rate for egress traffic to these CDN locations. Google says the idea here is to “encourage the best practice of regularly distributing content originating from Cloud Platform out to the edge close to your end-users. Google provides a private, high-performance link between Cloud Platform and the CDN providers we work with..”

So we see Google doing the partner thing. Going it alone may be lonely and expensive. The article mentions that the importance of CDNs will only grow with the weight of web pages, which are so often plied with high-res images and HD video. So long as Google can’t solve this problem itself, they are happy to partner up with providers.

Chelsea Kerwin, September 21, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Where’s the Finish Line Enterprise Search?

September 16, 2015

What never ceases to amaze me is that people are always perplexed when goals for technology change.  It always comes with a big hullabaloo and rather than complaining about the changes, time would be better spent learning ways to adapt and learn from the changes.  Enterprise search is one of those technology topics that sees slow growth, but when changes occur they are huge.  Digital Workplace Group tracks the newest changes in enterprise search, explains why they happened, and how to adapt: “7 Ways The Goal Posts On Enterprise Search Have Moved.”

After spending an inordinate amount of explaining how the author arrived at the seven ways enterprise search has changed, we are finally treated to the bulk of the article.  Among the seven reasons are obvious insights that have been discussed in prior articles on Beyond Search, but there are new ideas to ruminate about.  Among the obvious are that users want direct answers, they expect search to do more than find information, and understanding a user’s intent.  While the obvious insights are already implemented in search engines, enterprise search lags behind.

Enterprise search should work on a more personalized level due it being part of a closed network and how people rely on it to fulfill an immediate need.  A social filter could be applied to display a user’s personal data in search results and also users rely on the search filter as a quick shortcut feature. Enterprise search is way behind in taking advantage of search analytics and how users consume and manipulate data.

“To summarize everything above: Search isn’t about search; it’s about finding, connecting, answers, behaviors and productivity. Some of the above changes are already here within enterprises. Some are still just being tested in the consumer space. But all of them point to a new phase in the life of the Internet, intranets, computer technology and the experience of modern, digital work.”

As always there is a lot of room for enterprise search improvement, but these changes need to made for an updated and better work experience.

Whitney Grace, September 16, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Freedom Versus Fear

September 4, 2015

The Ashley Madison data breach has understandably been getting a lot of press, but what does it portend for the future of the Internet? Computerworld’s Tech Decoder predicts far-reaching consequences in, “Here’s Why the Dark Web Just  Got a Lot Darker.” Security experts predict a boom in phishing scams connected to this data breach, as well as copycat hackers poised to attack other (more legit) companies.

Reporter John Brandon suspects such activity will lead to the government stepping in to create two separate Internet channels: one “wild and unprotected” side and a “commercial” side, perhaps sponsored by big-name communications companies, that comes with an expectation of privacy. Great, one might think, we won’t have to worry if we’re not up to anything shady! But there’s more to it. Brandon explains:

“The problem is that I’m a big proponent of entrepreneurship. I won’t comment on whether I think Ashley Madison is a legitimate business. … However, I do want to defend the rights of some random dude in Omaha who wants to sell smartphone cables. He won’t have a chance to compete on the ‘commercial’ side of the Internet, so he’ll probably have to create a site on the unprotected second-tier channel, the one that is ‘free and open’ for everyone. Good luck with that.

“Is it fair? Is it even (shudder) moral? The commercial side will likely be well funded, fast, reliable, government-sanctioned, and possibly heavily taxed. The free side will be like drinking water at the local cesspool. In the end, the free and open Internet is that way for a reason. It’s not so you can cheat on your wife. Frankly, people will do that with or without the Internet. The ‘free and open’ bit is intended to foster ideas. It’s meant to level the playing field. It’s meant to help that one guy in Omaha.”

Yes, security is important, but so is opportunity. Can our society strike a balance, or will fear reign? Stay tuned.

Cynthia Murrell, September 4, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Its Hacker Season

August 21, 2015

One of the quintessential cartoon feuds exists between Bugs Bunny and Daffy Duck as they argue whether or not it is duck or rabbit hunting season.  Whoever wins gets the lovely prize of having their face blown off, thankfully cartoon violence does not obey the rules of life and death.  The ensuing argument ends with hilarious consequences, but everyday another type of big game is always in season: your personal information.  Hackers are constantly searching for ways to break into vulnerable systems and steal valuable information.

One a personal level it is frightening to be hacked, but corporations stand risk millions of dollars, customer information, trade secrets, and their reputations if their systems get hacked.   There are many companies that specialize in software to prevent potential hackings, but Cybereason offers unique selling points in the article, “Introducing Cybereason: Real-Time Automated Cyber Hunting.”

“This is why Cybereason exists, to bring the fight against hackers off of the frontlines and into the depths of your environment, where they lurk after gaining unnoticed access. Security needs to be about having an ever-watchful eye over your endpoints, servers, and network, and the Cybereason platform will allow you to perform real-time, automated hunting across your entire environment.”

On their Web site they posted a product video that feeds on the US’s culture of fear and they present an Armageddon like situation complete with a female voice over artist with a British accent, a Guy Fawkes mask, and Matrix-like graphics.  My favorite bit is when Cybereason is made to resemble a secret intelligence agency of superheroes.

Despite the clichéd video, it does give a thorough visualization of what Cybereason’s software and services can do.  The fear factor might be a selling point for some clients, but I’d rather hear hard facts and direct solutions.  It takes out the dramatic elements and actually tells me what the product can do for me.  You have to love Cybereason’s ending phrase, “Let the hunt begin.” It makes me want to respond with, “May the odds ever be in your favor.”

Whitney Grace, August 21, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

A Call for More Friendly Enterprise Search Results

August 10, 2015

An idea from ClearBox Consulting would bring enterprise search results in line with today’s online searches. The company’s blog asserts, “Enterprise Search? We Need Some Answers on a Card.” Writer  Sam Marshall likes the way Google now succinctly presents key information about a user’s query in a “card” at the top of the results page, ahead of the old-school list of relevant links. For example, he writes:

“Imagine you want to know the time of the next train between two cities. When you type this into Google, the first hit isn’t a link to a site but a card like the one below. It not only gives the times but also useful additional information: a map, trip duration, and tabs for walking, driving, and cycling. Enterprise search isn’t like this. The same query on an intranet gives the equivalent of a link to a PDF containing the timetable for the whole region. It’s like saying ‘here’s the book, look it up yourself’. This is not only a poor user experience for the employee, but a direct cost to the employer in wasted time. I’d like to see enterprise search move away from results pages of links to providing pages of answers too, and cards are a powerful way of doing this.”

Marshall emphasizes some advantage of the card approach: the most important information is right there, separated from related but irrelevant data; cards work better on mobile devices; and cards are user-friendly. Besides, he notes, since this format is now popular with sites from Facebook to Twitter, users are becoming familiar with them.

The card concept could be enhanced, Marshall continues, by personalizing results to the individual—tapping into employee profiles or even GPS data. For more information, see the article; it utilizes a hypothetical  query about paternity leave to well-illustrate its point. Though enterprise search is not exactly known for living on the cutting edge of technology, developers would be foolish not to incorporate this (or a similar) efficient format.

Cynthia Murrell, August 10, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Bodleian Library Gets Image Search

August 3, 2015

There is a lot of free information on the Internet, but the veracity is always in question.  While libraries are still the gateway of knowledge, many of their rarer, more historic works are buried in archives.  These collections offer a wealth of information that is often very interesting.  The biggest problem is that libraries often lack the funds to scan archival collections and create a digital library.  Oxford University’s Bodleian Library, one of the oldest libraries in Europe, has the benefit of funds and an excellent collection to share with the world.

Digital Bodleian boasts over 115,179 images as of writing this article, stating that it is constantly updating the collection.  The online library takes a modern approach to how users interact with the images by taking tips from social media.  Not only can users browse and search the images randomly or in the pre-sorted collections, they can also create their own custom libraries and sharing the libraries with friends.

It is a bold move for a library, especially for one as renowned as Bodleian, to embrace a digital collection as well as offering a social media-like service.  In my experience, digital library collections are bogged down by copyright, incomplete indices or ontologies, and they lack images to perk a users’ interest.  Digital Bodleian is the opposite of many of its sister archives, but another thing I have noticed is that users are not too keen on joining a library social media site.  It means having to sign up for yet another service and also their friends probably aren’t on it.

Here is an idea, how about a historical social media site similar to Pinterest that pulls records from official library archives?  It would offer the ability to see the actual items, verify information, and even yield those clickbait top ten lists.

Whitney Grace, August 3, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Before The SEC

July 6, 2015

Searching the Web you can find the most amazing and obscure items, such as this little gem from the Securities and Exchange Commission’s Web site: “Schedule 14A” registered by Google IncSchedule 14A explains information required for an SEC proxy statement, which is given to stockholders when votes are solicited at stockholders’ meetings.  This Schedule 14A lists many of the high-tech projects Google is working on to improve the lives of people.  Google founder Sergey Brin supposedly writes the schedule, but more than likely is was written by an assistant and his name was signed at the end.

It opens with this brief passage:

“When Larry and I founded Google in 1998, many elements came together to make our work possible. Like other companies at the time, we benefited from the increasing power and low cost of computation and from the unprecedented shift of information to the internet. We shared a profound belief in the power of technology to make life better for people everywhere and imagined what life could be like 10, 15, 20 years down the road. Nevertheless, now that we are here, I am amazed at the progress and opportunities. For example, I could not have imagined we would be making a computer that fits in a contact lens, with the potential to make life better for millions of people with diabetes.”

It is followed by a description of the contact lens that measures glucose levels in a body, then it goes into how Google revolutionized search and in turn delivered high-end services like email and Google Photos.

What Google piece would be complete without mentioning the self-driving cars?  Autonomous cars came about by increased computation power, but at least they do mention it will be sometime before they are ready for consumers.

Google does have an impressive list of accomplishments, sure to please any stockholder.  The question is will there be anything they will not experiment with?

Whitney Grace, July 6, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta