|By Avi Rosenthal||
|March 15, 2014 04:56 PM EDT||
If you think that you know better than others, you probably will not Adapt.
Example 1: A Bank
Few years ago, instead of receiving Web Page with one of my bank account reports, I received an error message.
As the report was consistently displayed correctly, it looks like a bug correction implemented with insufficient Regression Tests.
I notified the bank about the problem. They ignored my report and tried to find my incapability to use a Web Site (after more than 30 years in IT, including many years of using their Web Site).
After a week or two I identified the circumstances in which the report is not displayed correctly: It happens if and only if, the report should be displayed in more than one Web Page.
I send to the bank my analysis + the error message.
Unfortunately, I was not able to correct the bug without Source Code.
The result: Customers, including myself, had to wait two weeks for correction of a bug I could fix in an hour or two, if I could access the Source Code.
example 2: Another Bank
I found that a bank performed a transaction in a bank account I managed, without an order to do it. As the activity was an activity no customer would ask a bank to do, I thought that I had to go to talk to the clerk, who performed it.
Together we found the mistake the bank performed and corrected it. It was a mistake not an intention to steal money from the account.
However, based on my background in Computers Security Systems (Including Penetration Test in another bank), I easily found that someone (probably a bank employee) could use the same mechanism for criminal actions.
I even knew that an American bank programmer was convicted and jailed for stealing customers money using a similar mechanism to the mechanism used innocently in my account.
The Systems should be changed in order to identify unreasonable Orders and check them automatically or manually.
I wrote to the bank expecting that they will fix the vulnerability and thank me. I thought they probably pay me a little amount of money, which I intended to donate to an organization helping children suffering from cancer.
The bank thought that they new better: They ignored my message.
Do I post Spam?
I will list my writing experience and you will answer the question.
My writing activity includes:
1. An article based on my Masters Thesis in Psychology, written by me and my thesis moderator. He is a university Professor. The article was published in Hebrew in a local Scientific Journal.
2. Many articles on various Information Technology topics, which were published in local and European journals and local Web Sites.
3. Three blogs. The other two are written in Hebrew.
4. I participated in ebizq SOA Forum writing my opinion on questions asked.
5. I wrote about 100 articles in the Hebrew Wikipedia. A month ago I received a price for improving a stub article, during a competition for improving stub articles.
6. More than hundreds of posts in Facebook, Twitter, Googl+ and Linkedin (including many Linkedin groups).
Some of the posts received Comments, Likes and Shares.
Yesterday, I tried to post in Linkedin. I received a message that because someone (or some people) reported that a post of mine is Spam, the post will not displayed, but will be submitted to The Group Leader, who will check the post and decide to publish it or not to publish it.
What is the Problem?
There are two Linkedin Groups types:
1. Groups whose policy is to moderate posts prior to publishing.
The group leader is aware of posts he has to moderate. He will probably moderate the posts shortly after they were submitted.
As a member of many Groups of this type, I submitted posts which were published. Nothing was changed due to flagging a post of mine as Spam.
2. Groups whose policy is to publish automatically
The problem is that in those groups the group leader is unaware of Posts waiting moderation. According to Linkedin message it could take weeks until they approve my post and publish it.
Timing could be a significant factor for Posts Publishing.
Linkedin message send to me, recommended applying to Group Leaders and asking them to remove the restriction, so my posts could be published automatically.
I am a member of too many Groups of that type. I prefer to write this post instead of applying to all groups leaders.
It is not a personal problem. Any body's viable posts could be marked as Spam intentionally or unintentionally.
Is Linkedin Spam detection limited?
The answer to this question is Yes.
Linkedin should use the approach used by Anti-Spam Software, based on Bayesian algorithms.
If someone posted many posts and get Likes and Comments do not hurry to restrict him, just because one or few readers marked it as a Spam (intentionally or unintentionally).
On the other hand, if someone posted only 5 posts and many people marked every post as Spam stop him, by a mechanism similar to the mechanism used to stop me or even more extreme procedure.
It should be a gradual process based on additional information.
It looks like Linkedin's approach resembles the approach the Banks in example 1 and example 2 adopted.
According to the answer they send to me, when I suggested that they will improve their Spam detection algorithm, they stick to the current approach.
As anyone can mark any post as Spam, probably they may change their algorithm only after someone will intentionally mark as Spam many posts by leading contributors.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 20, 2017 08:45 AM EST
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Feb. 20, 2017 08:45 AM EST Reads: 1,388
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Feb. 20, 2017 08:30 AM EST Reads: 5,104
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Feb. 20, 2017 08:30 AM EST Reads: 944
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
Feb. 20, 2017 08:30 AM EST Reads: 2,192
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
Feb. 20, 2017 08:15 AM EST Reads: 1,135
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Feb. 20, 2017 07:45 AM EST Reads: 106
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Feb. 20, 2017 07:30 AM EST Reads: 150
Stratoscale, the software company developing the next generation data center operating system, exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016.Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere, IT is empowered to take control of their data ce...
Feb. 20, 2017 07:15 AM EST Reads: 666
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
Feb. 20, 2017 07:15 AM EST Reads: 3,376
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Feb. 20, 2017 07:15 AM EST Reads: 116
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
Feb. 20, 2017 07:00 AM EST Reads: 1,448
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
Feb. 20, 2017 06:45 AM EST Reads: 278
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
Feb. 20, 2017 06:30 AM EST Reads: 1,087
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
Feb. 20, 2017 06:00 AM EST Reads: 1,612