Blog Feed Post

Linkedin: We know better

Agility is essential in the modern Business and Information Technology world. Many posts about  Service Oriented Architecture and Business Process Management in this blog are about Agility and Adaptation.

If you think that you know better than others, you probably will not Adapt.

Example 1: A Bank
Few years ago, instead of receiving Web Page with one of my bank account reports, I received an error message.
As the report was consistently displayed correctly, it looks like a bug correction implemented with insufficient Regression Tests.  

I notified the bank about the problem. They ignored my report and tried to find my incapability to use a Web Site (after more than 30 years in IT, including many years of using their Web Site).

After a week or two I identified the circumstances in which the report is not displayed correctly: It happens if and only if, the report should be displayed in more than one Web Page.
I send to the bank my analysis + the error message.

Unfortunately, I was not able to correct the bug without Source Code.
The result: Customers, including myself, had to wait two weeks for correction of a bug I could fix in an hour or two, if I could access the Source Code.  

example 2: Another Bank
I found that a bank performed a transaction in a bank account I managed, without an order to do it. As the activity was an activity no customer would ask a bank to do, I thought that I had to go to talk to the clerk, who performed it. 
Together we found the mistake the bank performed and corrected it. It was a mistake not an intention to steal money from the account.

However, based on my background in Computers Security Systems (Including Penetration Test in another bank), I easily found that someone (probably a bank employee) could use the same mechanism for criminal actions.

I even knew that an American bank programmer was convicted and jailed for stealing customers money using a similar mechanism to the mechanism used innocently in my account. 
The Systems should be changed in order to identify unreasonable Orders and check them  automatically or manually

I wrote to the bank expecting that they will fix the vulnerability and thank me. I thought they probably pay me a little amount of money, which I intended to donate to an organization helping children suffering from cancer. 

The bank thought that they new better: They ignored my message.

Do I post Spam?
I will list my writing experience and you will answer the question.

My writing activity includes:

1. An article based on my Masters Thesis in Psychology, written by me and my thesis moderator. He is a  university Professor. The article was published in Hebrew in a local Scientific Journal.

2. Many articles on various Information Technology topics, which were published in local and European journals and local Web Sites. 

3. Three blogs. The other two are written in Hebrew.

4. I participated in ebizq SOA Forum writing my opinion on questions asked.

5. I wrote about 100 articles in the Hebrew Wikipedia. A month ago I received a price for improving a stub article, during a competition for improving stub articles.  

6. More than hundreds of posts in Facebook, Twitter, Googl+ and Linkedin (including many Linkedin groups).
Some of the posts received Comments, Likes and Shares.
Yesterday, I tried to post in Linkedin. I received a message that because someone (or some people)  reported that a post of mine is Spam, the post will not displayed, but will be submitted to The Group Leader, who will check the post and decide to publish it or not to publish it.

What is the Problem?
There are two Linkedin Groups types:

1. Groups whose policy is to moderate posts prior to  publishing.
The group leader is aware of posts he has to moderate. He will probably moderate the posts shortly after they were submitted.
As a member of many Groups of this type, I submitted posts which were published. Nothing was changed due to flagging a post of mine as Spam.

2. Groups whose policy is to publish automatically
The problem is that in those groups the group leader is unaware of Posts waiting moderation. According to Linkedin message it could take weeks until they approve my post and publish it. 

Timing could be a significant factor for Posts Publishing.

Linkedin message send to me, recommended applying to Group Leaders and asking them to remove the restriction, so my posts could be published automatically. 

I am a member of too many Groups of that type. I prefer to write this post instead of applying to all groups leaders. 

It is not a personal problem. Any body's viable posts could be marked as Spam intentionally or unintentionally.

Is Linkedin Spam detection limited?
The answer to this question is Yes
Linkedin should use the approach used by Anti-Spam Software, based on Bayesian algorithms.  

If someone posted many posts and get Likes and Comments do not hurry to restrict him, just because one or few readers marked it as a Spam (intentionally or unintentionally). 

On the other hand, if someone posted only 5 posts and many people marked every post as Spam stop him, by a mechanism similar to the mechanism used to stop me or even more extreme procedure.

It should be a gradual process based on additional information.

My Take
It looks like Linkedin's approach resembles the approach the Banks in example 1 and example 2 adopted.

According to the answer they send to me, when I suggested that they will improve their Spam detection algorithm, they stick to the current approach. 

As anyone can mark any post as Spam, probably they may change their algorithm only after someone will intentionally mark as Spam many posts by leading contributors. 

Read the original blog entry...

More Stories By Avi Rosenthal

Ari has over 30 years of experience in IT across a wide variety of technology platforms, including application development, technology selection, application and infrastructure strategies, system design, middleware and transaction management technologies and security.

Positions held include CTO for one of the largest software houses in Israel as well as the CTO position for one of the largest ministries of the Israeli government.

Latest Stories
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and ...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will advance interoperability between connected devices from both groups, enabling the full operating potential of IoT and representing a significant step towards a connected ecosystem.