Image-Based Search Technology Gains Steam
October 10, 2016
If you need to do a bit of smartphone photos clean-up, now is a good time. More websites are integrating photo-based search technologies according to Pinterest Will Let You Snap Photos To Find Real-Life Products Online. This piece from Forbes explains camera search will be available in the coming months and will allow users to snap a photo of, for example, a purse they see someone else carrying down the street, and find similar products on Pinterest. They’re calling these products “buyable pins”. According to the article,
Users make 130 million visual searches on Pinterest per month and about 2 billion total searches. Now, more than 10 million products can be purchased without leaving Pinterest from more than 20,000 retailers, up from 2 million products when “buyable pins” launched about a year ago. When a user sees a product on Pinterest, they are two times more likely to buy it in-store. And if a merchant promotes the pin, users are five times more likely to buy the item in person, the company said. In testing “buyable pins,” Pinterest said a third of purchases made on the web were first discovered on mobile. More than 80% of users access Pinterest on mobile devices.
Some applications for this search technology, may not be well-poised to monetize this, but according to a survey cited in the article 55 percent of respondents already consider Pinterest as e-commerce. Currently, the platform sees itself as a “bridge between inspiration and making it part of your real life.” This is essentially the role of any brick-and-mortar shop amenable to window-shopping. So, while it may work, we certainly can’t say the strategy is new.
Megan Feil, October 10, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Lexmark Upgrades Its Enterprise Search
September 30, 2016
Enterprise search has taken a back a back seat to search news regarding Google’s next endeavor and what the next big thing is in big data. Enterprise search may have taken a back seat in my news feed, but it is still a major component in enterprise systems. You can even speculate that without a search function, enterprise systems are useless.
Lexmark, one of the largest suppliers of printers and business solutions in the country, understand the importance of enterprise search. This is why they recently updated the description of its Perceptive Enterprise Search in its system’s technical specifications:
Perceptive Enterprise Search is a suite of enterprise applications that offer a choice of options for high performance search and mobile information access. The technical specifications in this document are specific to Perceptive Enterprise Search version 10.6…
A required amount of memory and disk space is provided. You must meet these requirements to support your Perceptive Enterprise Search system. These requirements specifically list the needs of Perceptive Enterprise Search and do not include any amount of memory or disk space you require for the operating system, environment, or other software that runs on the same machine.
Some technical specifications also provide recommendations. While requirements define the minimum system required to run Perceptive Enterprise Search, the recommended specifications serve as suggestions to improve the performance of your system. For maximum performance, review your specific environment, network, and platform capabilities and analyze your planned business usage of the system. Your specific system may require additional resources above these recommendations.”
It is pretty standard fare when it comes to technical specifications, in other words, not that interesting but necessary to make the enterprise system work correctly.
Whitney Grace, September 30, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Zen of More Tabs from Yandex
September 5, 2016
Serendipitous information discovery has been attempted through many apps, browsers and more. Attempting a solution, Russia’s giant in online search, Yandex, launched a new feature to their browser. A news release from PR Newswire appeared on 4 Traders entitled Yandex Adds AI-based Personal Recommendations to Browser tells us more. Fueling this feature is Yandex’s personalized content recommendation technology called Zen, which selects articles, videos, images and more for its infinite content stream. This is the first time personally targeted content will appear in new tabs for the user. The press release offers a description of the new feature,
The intelligent content discovery feed in Yandex Browser delivers personal recommendations based on the user’s location, browsing history, their viewing history and preferences in Zen, among hundreds of other factors. Zen uses natural language processing and computer vision to understand the verbal and visual content on the pages the user has viewed, liked or disliked, to offer them the content they are likely to like. To start exploring this new internet experience, all one needs to do is download Yandex Browser and give Zen some browsing history to work with. Alternatively, liking or disliking a few websites on Zen’s start up page will help it understand your preferences on the outset.
The world of online search and information discovery is ever-evolving. For a preview of the new Yandex feature, go to their demo. This service works on all platforms in 24 different countries and in 15 different languages. The design of this feature implies people want to actually read all of their recommended content. Whether that’s the case or not, whether Zen is accurate enough for the design to be effective, time will tell.
Megan Feil, September 5, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden Web/DarkWeb meet up on September 27, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233599645/
Superior Customer Service Promised through the Accenture Virtual Agent Amelia
August 17, 2016
The article titled Accenture Forms New Business Unit Around IPsoft’s Amelia AI Platform on ZDNet introduces Amelia as a virtual agent capable of providing services in industries such as banking, insurance, and travel. Amelia looks an awful lot like Ava from the film Ex Machina, wherein an AI robot manipulates a young programmer by appealing to his empathy. Similarly, Accenture’s Amelia is supposed to be far more expressive and empathetic than her kin in the female AI world such as Siri or Amazon’s Alexa. The article states,
“Accenture said it will develop a suite of go-to-market strategies and consulting services based off of the Amelia platform…the point is to appeal to executives who “are overwhelmed by the plethora of technologies and many products that are advertising AI or Cognitive capabilities”…For Accenture, the formation of the Amelia practice is the latest push by the company to establish a presence in the rapidly expanding AI market, which research firm IDC predicts will reach $9.2 billion by 2019.”
What’s that behind Amelia, you ask? Looks like a parade of consultants ready and willing to advise the hapless executives who are so overwhelmed by their options. The Amelia AI Platform is being positioned as a superior customer service agent who will usher in the era of digital employees.
Chelsea Kerwin, August 17, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/
Gazing Into the Crystal Ball for SharePoint’s Future
August 20, 2015
As soon as one version of SharePoint is released, speculation begins on the next. After all, it keeps the fun alive, right? While Microsoft has already redoubled its commitment to on-premises versions with its upcoming SharePoint Server 2016, experts still wonder what the future holds. Read more of the predictions in the Redmond Magazine article, “What Does SharePoint’s Future Hold?”
The article begins:
“As we sit and wait for the general availability of SharePoint 2016 next year, members of the product team have already started to talk about vNext. Not as far as specific features, mind you, but commenting on the fact that Microsoft will continue to provide an on-premises version of the platform as long as the market demand is there . . . Microsoft recognizes that on-prem will be around for a long time, if not mostly in the form of hybrid environments.”
Users will no doubt be anxious to flesh out what “hybrid” really means in their environment. Additionally, security and ease-of-use will continue to be top priorities going into the future. To stay on top of the latest developments, stay tuned to ArnoldIT.com for an easy to digest rundown via a dedicated SharePoint feed. Stephen E. Arnold is a longtime leader in search, and provides an expert opinion in a one-stop-shop format.
Emily Rae Aldridge, August 20, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Facebook Number One Security Compromiser
August 18, 2015
While Facebook is a good way for a company to engage with clients and even “humanize” the business, according to Zerofox’s article, “Cisco: Facebook Scams Are Attackers’ #1 Choice For Breaches” Facebook is the number way for a criminal to learn about organization and hack into its system. Cisco conducted a 2015 Midyear Security Report that researches how cyber criminals are exploiting social media to their own advantage.
The article describes potential targets as easy and click-happy:
“Facebook’s 1.49 billion monthly active users make it the world’s largest nation-state, used by 70% of American each day. It is, for better or worse, a nation without borders. Adversaries exploit the social media giant for its sheer size and trusted nature, making it the medium of choice for both inexperienced and sophisticated network hackers alike. For the adversary, the barriers to entry have never been lower, and the targets have never been more trusting and click-happy.”
Other security organizations confirm the findings and some of it comes from people simply being too trusting such as accepting friend requests from unfamiliar people. McAfee discovered that employees became cybercrime victims on social media over other business applications.
While Facebook might be the number one platform to attract criminals. Twitter is used to attack government organizations and other popular platforms are also dealing with loads of fake profiles. It does not come as a surprise, considering Facebook is now the “Walt-Mart” of social media information. What types of scams are people falling victim too? Is it just stolen passwords and information or are they giving their personal information away?
Whitney Grace, August 18, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Googles Chauvinistic Job Advertising Delivery
July 28, 2015
I thought we were working to get more women into the tech industry, not fewer. That’s why it was so disappointing to read, “Google Found to Specifically Target Men Over Women When It Comes to High-Paid Job Adverts” at IBTimes. It was a tool dubbed AdFisher, developed by some curious folks at Carnegie Mellon and the International Computer Science Institute, that confirmed the disparity. Knowing that internet-usage tracking determines what ads each of us sees, the researchers wondered whether such “tailored ad experiences” were limiting employment opportunities for half the population. Reporter Alistair Charlton writes:
“AdFisher works by acting as thousands of web users, each taking a carefully chosen route across the internet in such a way that an ad-targeting network like Google Ads will infer certain interests and characteristics from them. The programme then records which adverts are displayed when it later visits a news website that uses Google’s ad network. It can be set to act as a man or woman, then flag any differences in the adverts it is shown.
“Anupam Datta, an associate professor at Carnegie Mellon University, said in the MIT Technology Review: ‘I think our findings suggest that there are parts of the ad ecosystem where kinds of discrimination are beginning to emerge and there is a lack of transparency. This is concerning from a societal standpoint.’”
Indeed it is, good sir. The team has now turned AdFisher’s attention to Microsoft’s Bing; will that search platform prove to be just as chauvinistic? For Google’s part, they say they’re looking into the study’s methodology to “understand its findings.” It remains to be seen what sort of parent the search giant will be; will it simply defend its algorithmic offspring, or demand it mend its ways?
Cynthia Murrell, July 28, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Deep Learning System Surprises Researchers
June 24, 2015
Researchers were surprised when their scene-classification AI performed some independent study, we learn from Kurzweil’s article, “MIT Deep-Learning System Autonomously Learns to Identify Objects.”
At last December’s International Conference on Learning Representations, a research team from MIT demonstrated that their scene-recognition software was 25-33 percent more accurate than its leading predecessor. They also presented a paper describing the object-identification tactic their software chose to adopt; perhaps this is what gave it the edge. The paper’s lead author, and MIT computer science/ engineering associate professor, Antonio Torralba ponders the development:
“Deep learning works very well, but it’s very hard to understand why it works — what is the internal representation that the network is building. It could be that the representations for scenes are parts of scenes that don’t make any sense, like corners or pieces of objects. But it could be that it’s objects: To know that something is a bedroom, you need to see the bed; to know that something is a conference room, you need to see a table and chairs. That’s what we found, that the network is really finding these objects.”
Researchers being researchers, the team is investigating their own software’s initiative. The article tells us:
“In ongoing work, the researchers are starting from scratch and retraining their network on the same data sets, to see if it consistently converges on the same objects, or whether it can randomly evolve in different directions that still produce good predictions. They’re also exploring whether object detection and scene detection can feed back into each other, to improve the performance of both. ‘But we want to do that in a way that doesn’t force the network to do something that it doesn’t want to do,’ Torralba says.”
Very respectful. See the article for a few more details on this ambitious AI, or check out the researchers’ open-access paper here.
Cynthia Murrell, June 24, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
New Analysis Tool for Hadoop Data from Oracle
June 23, 2015
Oracle offers new ways to analyze Hadoop data, we learn from the brief write-up, “Oracle Zeroes in on Hadoop Data with New Analytics Tool” at PCWorld. Use of the Hadoop open-source distributed file system continues to grow among businesses and other organizations, so it is no surprise to see enterprise software giant Oracle developing such tools. This new software is dubbed Oracle Big Data Spatial and Graph. Writer Katherine Noyes reports:
“Users of Oracle’s database have long had access to spatial and graph analytics tools, which are used to uncover relationships and analyze data sets involving location. Aiming to tackle more diverse data sets and minimize the need for data movement, Oracle created the product to be able to process data natively on Hadoop and in parallel using MapReduce or in-memory structures.
“There are two main components. One is a distributed property graph with more than 35 high-performance, parallel, in-memory analytic functions. The other is a collection of spatial-analysis functions and services to evaluate data based on how near or far something is, whether it falls within a boundary or region, or to process and visualize geospatial data and imagery.”
The write-up notes that such analysis can reveal connections for organizations to capitalize upon, like relationships between customers or assets. The software is, of course, compatible with Oracle’s own Big Data Appliance platform, but can be deployed on other Hadoop and NoSQL systems, as well.
Cynthia Murrell, June 23, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Chrome Restricts Extensions amid Security Threats
June 22, 2015
Despite efforts to maintain an open Internet, malware seems to be pushing online explorers into walled gardens, akin the old AOL setup. The trend is illustrated by a story at PandoDaily, “Security Trumps Ideology as Google Closes Off its Chrome Platform.” Beginning this July, Chrome users will only be able to download extensions for that browser from the official Chrome Web Store. This change is on the heels of one made in March—apps submitted to Google’s Play Store must now pass a review. Extreme measures to combat an extreme problem with malicious software.
The company tried a middle-ground approach last year, when they imposed the our-store-only policy on all users except those using Chrome’s development build. The makers of malware, though, are adaptable creatures; they found a way to force users into the development channel, then slip in their pernicious extensions. Writer Nathanieo Mott welcomes the changes, given the realities:
“It’s hard to convince people that they should use open platforms that leave them vulnerable to attack. There are good reasons to support those platforms—like limiting the influence tech companies have on the world’s information and avoiding government backdoors—but those pale in comparison to everyday security concerns. Google seems to have realized this. The chaos of openness has been replaced by the order of closed-off systems, not because the company has abandoned its ideals, but because protecting consumers is more important than ideology.”
Better safe than sorry? Perhaps.
Cynthia Murrell, June 22, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

