Is Bing Full of Bugs or Is Constant Change And “Agility” the Wave of the Future?

February 29, 2016

The article titled  600 Engineers Make 4,000 Changes to Bing Each Week on WinBeta goes behind the scenes of a search engine. The title seems to suggest that Bing is a disaster with so many bugs that only a fleet of engineers working around the clock can manage the number of bugs in the system. That is actually far from the impression that the article makes. Instead, it stresses the constant innovation that Bing calls “Continuous Delivery” or “Agility.” The article states,

“How about the 600 engineers mentioned above pushing more than 4,000 individual changes a week into a testing phase containing over 20,000 tests. Each test can last from 10 minutes to several hours or days… Agility incorporates two “loops,” the Inner Loop that is where engineers write the code, prototype, and crowd-source features. Then, there’s an Outer Loop where the code goes live, gets tested by users, and then pushes out to the world.”

For more details on the sort of rapid and creative efforts made possible by so many engineers, check out the Bing Visual Blog Post created by a Microsoft team. The article also reminds us that Bing is not only a search engine, but also the life-force behind Microsoft’s Cortana, as well as being integrated into Misrosoft Office 2016, AOL and Siri.

 

Chelsea Kerwin, February 29, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Startup Semantic Machines Scores Funding

February 26, 2016

A semantic startup looks poised for success with experienced  executives and a hefty investment, we learn from “Artificial Intelligence Startup Semantic Machines Raises $12.3 Million” at VentureBeat. Backed by investors from Bain Capital Ventures and General Catalyst Partners, the enterprise focuses on deep learning and improved speech recognition. The write-up reveals:

“Last year, Semantic Machines named Larry Gillick as its chief technology officer. Gillick was previously chief speech scientist for Siri at Apple. Now Semantic Machines is looking to go further than Siri and other personal digital assistants currently on the market. ‘Semantic Machines is developing technology that goes beyond understanding commands, to understanding conversations,’ the startup says on its website. ‘Our Conversational AI represents a powerful new paradigm, enabling computers to communicate, collaborate, understand our goals, and accomplish tasks.’ The startup is building tools that third-party developers will be able to use.”

Launched in 2014, Semantic Machines is based in Newton, Massachusetts, with offices in Berkeley and Boston. The startup is also seeking to hire a few researchers and engineers, in case anyone is interested.

 

Cynthia Murrell, February 26, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Brown Dog Fetches Buried Data

February 25, 2016

Outdated file formats, particularly those with no metadata, are especially difficult to search and utilize. The National Science Foundation (NSF) reports on a new search engine designed to plumb the unstructured Web in, “Brown Dog: A Search Engine for the Other 99 Percent (ofData).” With the help of a $10 million award from the NSF, a team at the University of Illinois-based National Center for Supercomputing Application (NCSA) has developed two complementary services. Writer Aaron Dubrow explains:

“The first service, the Data Access Proxy (DAP), transforms unreadable files into readable ones by linking together a series of computing and translational operations behind the scenes. Similar to an Internet gateway, the configuration of the Data Access Proxy would be entered into a user’s machine settings and then forgotten. From then on, data requests over HTTP would first be examined by the proxy to determine if the native file format is readable on the client device. If not, the DAP would be called in the background to convert the file into the best possible format….

“The second tool, the Data Tilling Service (DTS), lets individuals search collections of data, possibly using an existing file to discover other similar files in the data. Once the machine and browser settings are configured, a search field will be appended to the browser where example files can be dropped in by the user. Doing so triggers the DTS to search the contents of all the files on a given site that are similar to the one provided by the use….  If the DTS encounters a file format it is unable to parse, it will use the Data Access Proxy to make the file accessible.”

See the article for more on these services, which NCSA’s Kenton McHenry likens to a DNS for data. Brown Dog conforms to NSF’s Data Infrastructure Building Blocks program, which supports development work that advances the field of data science.

 

Cynthia Murrell, February 25, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google to Combat Terrorist Messages with Counter Narrative AdWords

February 22, 2016

Governments are not alone in the fight against terrorism. Google Will Show ‘Counter-Narrative’ AdWords To Users Searching For Terrorist Websites from Tech Week Europe explains how Google is playing a role in containing terrorist messages. In effort to prove their commitment to anti-terrorist initiatives to UK members of parliament, Google will employ a counter narrative strategy using Google AdWords as a marketing channel for their anti-extremist messages. According to the article,

“Users searching for words and websites associated with religious extremism that is linked to terrorism will be shown the ‘counter-narrative’ via Google AdWords, the sponsored links that appear at the top of a search results page. Dr House also told MPs at the Common’s home affairs select committee that Google had removed 14 million videos from YouTube in 2014 for reasons that include terrorist content, according to the Telegraph. Google reportedly offers AdWords grants to NGOs, so that their ‘counter-narrative’ websites can appear on search results for queries such as ‘join Isis’, reported The Telegraph.”

In the article’s concluding remarks, the author raises several questions regarding censorship, freedom of speech and user control; the saying with great power comes great responsibility comes to mind. Developments related to Google’s counter narratives will be important to follow as the bigger-picture conversation unfolds.

 

Megan Feil, February 22, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search Vendor RAVN Systems Embraces Buzzwords

February 19, 2016

The article titled RAVN Systems Releases RAVN ACE for Automated Data Extraction of ISDA Documents Using Artificial Intelligence on BobsGuide details the needs of banks and other members of the derivatives market. Risk mitigation leads to ongoing negotiations that result in major documentation issues to keep up with the changes. The article explains how RAVN has met these challenges,

“RAVN ACE can extract the structure of the agreement, the clauses and sub-clauses, which can be very useful for subsequent re-negotiation purposes. It then further extracts the key definitions from the contract, including collateral data from tabular formats within the credit support annexes. All this data is made available for input to contract or collateral management and margining systems or can simply be provided as an Excel or XML output for analysis.”

Not only does RAVN ACE do the work in a fraction of the amount of time it would take a person, the output is also far more accurate, always good news when handling legal documents. The service also includes an audit service that compares terms from the documents with the manual abstraction. By doing so, RAVN ACE is able to analyze the risks and even estimate the amount of negotiating necessary to complete the contract.

Chelsea Kerwin, February 19, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Google 20% Time Policy Projects Take Users Around the World

February 18, 2016

The article on StumbleUpon titled 12 Lesser-Known Google Projects That Are Absolutely Amazing describes how certain Google employees took advantage of their creative time, or “20% time polcy” that dictates one day a week should be used experimentally. Hence some of these whimsical concepts like Google Sky, which functions similarly to Google Earth but in the far-out setting of space. Another idea is the game Ingress,

“Ingress transforms the real world into the landscape for a global game of mystery, intrigue, and competition. Our future is at stake. You must choose a side. A mysterious energy has been unearthed by a team of scientists in Europe. The origin and purpose of this force is unknown, but some researchers believe it is influencing the way we think. We must control it or it will control us.”

Other projects offer outlets to explore global culture and history, such as the World Wonders Project, which enables users to view high-res photos and 3D views of distant places like the Pyramids of Giza and Angor Wat. The Google Art Project contains quality images of important artworks from 400 art museums all over the world and allows users to build their own collections for take audio tours to learn more about famous pieces. Overall, the projects encourage increased engagement with technology, culture, and creativity.

 
Chelsea Kerwin, February 18, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

DirectEDGAR plus DtSearch Equals Superior Search for Analysts and Researchers

February 17, 2016

The article on PRNewswire titled directEDGAR SEC Edgar Database Research Platform Now Embeds The dtSearch® Engine for Enhanced Search and Retrieval discusses the partnership between dtSearch, AcademicEDGAR+, and AppsPlus. The merger is meant to improve advanced search for analysts and academic researchers who rely on search to enable them to wade through tens of millions of documents. Why did Dr. Kealey, CEO of AcademicEDGAR+ choose dtsearch? He explains in the article,

“We have over two terabytes of SEC filings and there was no other vendor whose offering allowed immediate access to any document in the results set no matter how many documents are returned.”  Dr. Kealey also notes that search granularity is critically important, and dtSearch’s unique operators extend far beyond the standard Boolean operators…To complete the implementation, AcademicEDGAR+ chose AppsPlus.”

AppsPlus has been around for over 15 years aiding in a huge range of development projects across industries. The article explains that with directEDGAR, users get more than just search. The product allows for extraction and normalization in one stop. That capability, paired with dtSearch’s instant search of terabytes, makes this partnership very exciting. Those academic researchers must be drooling into their elbow patches to get their hands on the new service.

 

Chelsea Kerwin, February 17, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

A Guide to Google-Ize Your Business

February 16, 2016

To Google is a verb, meaning to search specifically for information on the Google search engine.  If a user is unable to find information on Google, they either change their key words or look for a different option.  In other words, if you are not pulling up on Google than you might as well not exist.  Perhaps it is a little drastic to make the claim, but without a Web presence users, who double as consumers, are less likely to visit your business.  Consumers take an active approach to shopping these days by doing research before they visit or purchase any goods or services.  A good Web presence alerts them to a company’s capabilities and how it can meet the consumers’ needs.

If you are unsure of how to establish a Web presence, much less a Google Web presence then there is a free eBook to help you get started.  The Reach Local blog posted information about “Master Google My Business With Our New Ebook.” Google My Business is a free tool from Google about how to publish your business information in Google+, Google Maps, and local search results.

“Without accurate and up to date information on Google, you could be missing out on leads and potential customers either by having the wrong phone number and address listed or by not appearing at all in local search results for products and services relevant to your business.  We want to help you take control of your information on the web, so we put together a helpful eBook that explains what Google My Business is, how to set up and verify your business, and tips for managing your information and tracking your progress.”

The free eBook “Your Guide To Google My Business” written by the Reach Local folks is an instruction manual on how to take advantage of the Google tool without going through the headache of trying to understand how it works.  Now if only Windows 10 would follow a similar business pattern to help users understand how it works.

 

 

Whitney Grace, February 16, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

d

EasyAsk Unveils Mobile Shopping Solution Through Semantic Search

February 15, 2016

The announcement on PRWeb titled EasyAsk Introduces EasyAsk Voice Shopper Uniting Voice and Mobile for a Revolutionary Shopping Experience pairs shopping with semantic technology. According to the article, users will be able to hold a conversation with the EasyAsk search engine that will lead to the relevant and ideal product for the user. The article says,

“EasyAsk Voice Shopper creates a new paradigm for mobile shopping by allowing customers to have a conversation with a mobile commerce site or app, just like speaking with a sales associate. Having evolved from over 15 years of natural language research and development, the EasyAsk conversational search engine powers the conversation with the customer, combining an understanding of the shopper’s intent with the deep knowledge of retailer’s products and merchandising objectives to deliver the right products.”

The emphasis on mobile shopping is due to the research showing the low mobile shopping conversion rate of only 0.80%, most likely due to the pain-in-the-neck that is mobile shopping! Who hasn’t switched from their phone to their computer after clicking an email link for a cute pair of sneakers? In a perfect world, this new service would be like speaking to a real person. But unless I am mistaken, it will probably feel more like any number of voice menus that people find themselves shouting at to be understood.

 

Chelsea Kerwin, February 15, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

To Search the Dark Web

February 11, 2016

If you have wondered how, exactly, one searches for information on the Dark Web, take a gander at “The Best TOR Search Engines of 2016” at Cyberwarzone. Reporter CWZ writes:

“On the TOR network you can find various websites just like you find on the ‘normal web.’ The websites which are hosted on the TOR network are not indexed by search engines like Google, Bing and Yahoo, but the search engines which are listed below, do index the TOR websites which are hosted via the TOR network. It is important to remember that you do need the TOR client on your device in order to access the TOR network, if you cannot use a TOR client on your device, you can use one of the free TOR gateways which are listed below in the web TOR providers tab.”

The article warns about malicious TOR clients, and strongly suggests readers download the client found at the official TOR website. Four search engines are listed— https://Ahmia.fi,  https://Onion.cab, https://onion.link/, and http://thehiddenwiki.org/.  CWZ also lists those  Web TOR gateways, through which one can connect to TOR services with a standard Web browser instead of using a TOR client. See the end of the article for that information.

 

Cynthia Murrell, February 11, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta