Another Word For It Patrick Durusau on Topic Maps and Semantic Diversity

October 24, 2014

15 Tricks to Appear Smart in Emails

Filed under: Humor — Patrick Durusau @ 4:32 pm

15 Tricks to Appear Smart in Emails by Sarah Cooper.

From the post:

If you don’t care about appearing smart in emails, you can stop reading now.

Oh good, we’re alone.

In the corporate world, there is no ground more fertile for appearing smart than the rich earth that is electronic communication. Your email writing, sending and ignoring skills are just as important as your nodding skills, and even more important than your copying and pasting skills. Here are 15 email tricks that will make you appear smart, passionate, dedicated and most of all, smart.

Great illustrations to go along with the 15 tricks so see Sarah’s post.


Update: Is this beat up on email day? See: University administrator demands new email emphasis tool

Edinburgh. A University administrator has demanded a new tool with which to emphasize parts of e-mails, having exhausted traditional methods such as bold, italics, red text and flashing text.

“The simple fact is that people ignore my emails” said Ima Jobsworth, a senior administrator at the University of Berwick. “In the early days I used bold and italics to emphasize parts of the text, and people paid attention” he contnued. “But then they figured out that the bold and italicised sections were just as irrelevant to them as the rest of the email, perhaps even more so”.

September 28, 2014

Scientists confess to sneaking Bob Dylan lyrics into their work for the past 17 years

Filed under: Humor,Music,Natural Language Processing — Patrick Durusau @ 11:03 am

Scientists confess to sneaking Bob Dylan lyrics into their work for the past 17 years by Rachel Feltman.

From the post:

While writing an article about intestinal gasses 17 years ago, Karolinska Institute researchers John Lundberg and Eddie Weitzberg couldn’t resist a punny title: “Nitric Oxide and inflammation: The answer is blowing in the wind”.

Thus began their descent down the slippery slope of Bob Dylan call-outs. While the two men never put lyrics into their peer-reviewed studies, The Local Sweden reports, they started a personal tradition of getting as many Dylan quotes as possible into everything else they wrote — articles about other peoples’ work, editorials, book introductions, and so on.

An amusing illustration of one difficulty in natural language processing, allusion.

The Wikipedia article on allusion summarizes one typology of allusion (R. F. Thomas, “Virgil’s Georgics and the art of reference” Harvard Studies in Classical Philology 90 (1986) pp 171–98) as:

  1. Casual Reference, “the use of language which recalls a specific antecedent, but only in a general sense” that is relatively unimportant to the new context;
  2. Single Reference, in which the hearer or reader is intended to “recall the context of the model and apply that context to the new situation”; such a specific single reference in Virgil, according to Thomas, is a means of “making connections or conveying ideas on a level of intense subtlety”;
  3. Self-Reference, where the locus is in the poet’s own work;
  4. Corrective Allusion, where the imitation is clearly in opposition to the original source’s intentions;
  5. Apparent Reference, “which seems clearly to recall a specific model but which on closer inspection frustrates that intention”; and
  6. Multiple Reference or Conflation, which refers in various ways simultaneously to several sources, fusing and transforming the cultural traditions.

(emphasis in original)

Allusion is a sub-part of the larger subject of intertextuality.

Thinking of the difficulties that allusions introduce into NLP. With “Dylan lyrics meaning” as a quoted search string, I get over 60,000 “hits” consisting of widely varying interpretations. Add to that the interpretation of a Dylan allusion in a different context and you have a truly worthy NLP problem.

Two questions:

The Dylan post is one example of allusion. Is there any literature or sense of how much allusion occurs in specific types of writing?

Any literature on NLP techniques for dealing with allusion in general?

I first saw this in a tweet by Carl Anderson.

September 24, 2014

King James Programming

Filed under: Humor — Patrick Durusau @ 10:39 am

King James Programming

From the webpage:

Posts generated by a Markov chain trained on the King James Bible, Structure and Interpretation of Computer Programs, and Why’s Poignant Guide to Ruby.

A sampling from the main page:

(For six months did Joab remain there with all Israel, until he had utterly destroyed them and their contents with an empty x.)

3:10 And the LORD said unto Moses, Depart, and go up to build the initial instruction list

You may also appreciate the KJP Rejects page:

32:31 Pharaoh shall see them, and shall enjoy her sabbaths, as long as all references to Project Gutenberg are removed.

7:6 Then Jesus went thence, and departed into a mountain to pray, and not to me only, but unto all them that sold and bought in the temple

What texts would you use?

Markov chains have a serious side as well.

September 12, 2014

The Lesser Known Normal Forms of Database Design

Filed under: Database,Humor — Patrick Durusau @ 10:13 am

The Lesser Known Normal Forms of Database Design by John Myles White.

A refreshing retake on normal forms of database design!

Enjoy!

August 28, 2014

Thesaurus Joke

Filed under: Humor — Patrick Durusau @ 9:30 am

Lu Hersey tweets: “Best thesaurus joke I’ve seen all day :)”

Thesaurus

August 17, 2014

Bizarre Big Data Correlations

Filed under: BigData,Correlation,Humor,Statistics — Patrick Durusau @ 3:16 pm

Chance News 99 reported the following story:

The online lender ZestFinance Inc. found that people who fill out their loan applications using all capital letters default more often than people who use all lowercase letters, and more often still than people who use uppercase and lowercase letters correctly.

ZestFinance Chief Executive Douglas Merrill says the company looks at tens of thousands of signals when making a loan, and it doesn’t consider the capital-letter factor as significant as some other factors—such as income when linked with expenses and the local cost of living.

So while it may take capital letters into consideration when evaluating an application, it hasn’t held a loan up because of it.

Submitted by Paul Alper

If it weren’t an “online lender,” ZestFinance could take into account applications signed in crayon. 😉

Chance News collects stories with a statistical or probability angle. Some of them can be quite amusing.

August 14, 2014

Are You A Kardashian?

Filed under: Genome,Humor,Science — Patrick Durusau @ 1:42 pm

The Kardashian index: a measure of discrepant social media profile for scientists by Neil Hall.

Abstract:

In the era of social media there are now many different ways that a scientist can build their public profile; the publication of high-quality scientific papers being just one. While social media is a valuable tool for outreach and the sharing of ideas, there is a danger that this form of communication is gaining too high a value and that we are losing sight of key metrics of scientific value, such as citation indices. To help quantify this, I propose the ‘Kardashian Index’, a measure of discrepancy between a scientist’s social media profile and publication record based on the direct comparison of numbers of citations and Twitter followers.

A playful note on a new index based on a person’s popularity on twitter and their citation record. Not to be taken too seriously but not to be ignored altogether. The influence of popularity, the media asking Neil deGrasse Tyson, an astrophysicist and TV scientist, his opinion about GMOs, is a good example.

Tyson sees no difference between modern GMOs and selective breeding, which has been practiced for thousands of years. Tyson overlooks selective breeding’s requirement of an existing trait to bred towards. In other words, selective breeding has a natural limit built into the process.

For example, there are no naturally fluorescent Zebrafish:

Zebrafish

so you can’t selectively breed fluorescent ones.

On the other hand, with genetic modification, you can produce a variety of fluorescent Zebrafish know as GloFish:

Glofish

Genetic modification has no natural boundary as is present in selective breeding.

With that fact in mind, I think everyone would agree that selective breeding and genetic modification aren’t the same thing. Similar but different.

A subtle distinction that eludes Kardashian TV scientist Neil deGrasse Tyson (Twitter, 2.26M followers).

I first saw this in a tweet by Steven Strogatz.

August 5, 2014

Function Graphs and Other Applications for PostScript

Filed under: Humor,PostScript — Patrick Durusau @ 3:57 pm

Function Graphs and Other Applications for PostScript by Gernot Hoffmann.

From the introduction:

This documents shows some examples for drawing smooth curves by PostScript.

The main purpose is the creation of mathematical function graphs for placing in PageMaker.

The CIE Chromaticity Diagram is an advanced example for accurate 2D-graphics, based on mathematical data.

New developments show that accurate 3D graphics are possible, though with many restrictions.

The programming techniques differ considerably from the typical PostScript style.

PostScript uses the stack extensively. Optimized programs are hardly readable.
….

I don’t think you will find this to be useful but in a burst of nostalgia I had to post it.

I remember hand coding PostScript for output to an Apple IIe printer. It is an experience that will make you appreciate more recent software. 😉

I first saw this in a tweet by onepaperperday.

July 7, 2014

Search Suggestions

Filed under: Humor,Searching — Patrick Durusau @ 6:38 pm

James Hughes posted this image of search suggestions to Twitter:

search suggestions

How do you check search suggestions?

June 11, 2014

How Arrogant Are You?

Filed under: Humor,Natural Language Processing — Patrick Durusau @ 4:41 pm

AnalyzeWords

From the webpage:

AnalyzeWords helps reveal your personality by looking at how you use words. It is based on good scientific research connecting word use to who people are. So go to town – enter your Twitter name or the handles of friends, lovers, or Hollywood celebrities to learn about their emotions, social styles, and the ways they think.

Even though “…based on good scientific research…” I would not take the results too seriously.

Any more that I would take advice from a book called: “I’m OK, Your’re OK.” (I know the first isn’t likely and the second is untrue.) 😉

Play with it over a couple of days and try to guess the relationships between words and your ratings.

I first saw this in a tweet by Alyona Medelyan.

June 10, 2014

Larry Ellison as Pinocchio?

Filed under: Humor,Oracle — Patrick Durusau @ 6:39 pm

Hazelcast Enterprise: A Direct Challenge to Larry Ellison’s Vision for In-Memory Computing

You might not have sipped so much Oracle kool-aid today if Larry Ellison were in fact Pinocchio.

I don’t know about you but seeing Ellison balancing his nose on the end of a wheel barrow would make me think carefully about any statements he made.

You?

June 7, 2014

Lifehack: using your microwave oven against NSA snooping

Filed under: Humor — Patrick Durusau @ 7:35 pm

Lifehack: using your microwave oven against NSA snooping

The author says placing your cellphone in a microwave oven will prevent tracking of your cellphone. The oven acts as a Faraday cage.

Perhaps so but tracking someone walking around with a microwave oven under their arm isn’t going to be very difficult.

Yes?

May 19, 2014

The Internet Is Obsessed With Maps…

Filed under: Humor,Maps — Patrick Durusau @ 5:58 pm

The Internet Is Obsessed With Maps — Here’s Why It’s Gone Too Far by Mike Nudelman and Christina Sterbenz.

From the post:


“There’s something about maps that’s really authoritative and hard to question — we’re so used to seeing them …. But the more popular something becomes, the more people try to duplicate it without the expertise,” Fanning explained.

Condensing complex data into an easily and quickly digestible package often leads to oversimplification or, worse, misinformation. That becomes especially problematic when the map is viewed and shared far from its original context.

Of course, the maps in question are all visual but you could easily represent some topic maps as visual maps and capture that same sense of authority.

Have you faced issues of “oversimplification” or “misinformation” from use of a topic map? Any impact from a map being removed from its original context?

BTW, correction to the first map in the post. Tulane isn’t the “most desirable” college in Louisiana. LSU Baton Rouge is the “most desirable” college in Louisiana. 😉

May 16, 2014

spurious correlations

Filed under: Humor,Statistics — Patrick Durusau @ 7:44 pm

spurious correlations

You need to put this site on your browser toolbar for meeting where “correlations” are likely to be discussed.

May save a lot of explaining and hand waving on your part about the nature of correlations and causation.

My favorite so far is:

Per capita consumption of cheese (US)

correlates with

Number of people who died by becoming entangled in their bed sheets

cheese and bedsheets

Notice the number of people who died entangled in their bedsheets is 150X the number of Americans who died in domestic terror attacks in 2013. (Death rates from terrorism)

Makes you wonder how much money we are spending to make bedsheets safer for U.S. citizens only.

I first saw this in a tweet by Steven Strogatz.

May 8, 2014

Hello, NSA

Filed under: Cybersecurity,Humor,NSA,Security — Patrick Durusau @ 11:05 am

Hello, NSA

Motherboard has a web app that generates random sentences laced with words of interest to the NSA. I saw this in Researchers find post-Snowden chill stifling our search terms by Lisa Vaas at nakedsecurity.

The about page for the app reads:

Turns out Uncle Sam is more of a peeping Tom than we even thought.

Now we know that the US government keeps our personal phone records, and can in certain cases access our emails, status updates, photos, and other personal information. We’re still not exactly sure how they sift through all this data.

But last year, the Department of Homeland Security released a list of over 370 keywords that served as trip-wires amidst the flow of conversation that pours through social media.

The operation—which is just one of an untold number of government programs keeping tabs on our tabs—flagged a variety of hot terms related to terrorism (dirty bomb), cyber security (Mysql injection), infrastructure (bridge, airport), health (pandemic), places (Mexico), and political dissent (radical), as well as more banal verbiage like ‘pork’ and ‘exercise.’

So let’s play a word game! Use our handy phrase generator to come up with pearls of keyword-loaded Twitter wit and perhaps earn you a new follower in Washington. Tweet it out, email it to a friend, share it around, you know the drill—and remember that the NSA and other government agencies might be reading along. And don’t forget to say hello.

Read more about government surveillance programs:

How to Build a Secret Facebook

The Motherboard Guide to Avoiding the NSA

Privacy’s Public, Government-Sponsored Death

A Majority of Americans Believe NSA Phone Tracking Is Acceptable

‘Going Dark’: What’s So Wrong with the FBI’s Plan to Tap Our Internet?

All the PRISM Data the Tech Giants Have Been Allowed to Disclose So Far

Sorry, NSA, Terrorists Don’t Use Verizon. Or Skype. Or Gmail

Please make Hello, NSA your browser homepage and forward that link to friends as a pubic service announcement.

Finding subjects is hard enough with “normal” levels of semantic noise. Help validate the $billions being spent scooping and searching the Internet. Turn the semantic noise knob up a bit.

May 3, 2014

Judgmental Maps

Filed under: Humor,Mapping,Maps — Patrick Durusau @ 3:59 pm

Judgmental Maps

Imagine a map of a city with the neighborhood names removed but the interstate highways and a few other geographic features remaining.

Now further imagine that you have annotated that map with new names to represent the neighborhoods and activities in that city.

I tried to pick my favorite but in these sensitive times, someone would be offended by any choice I made.

You can create an submit maps in addition to viewing ones already posted.

I first saw this at Judgmental Maps on Chart Porn.

April 24, 2014

We have no “yellow curved fruit” today

Filed under: Humor,Names,Subject Identity — Patrick Durusau @ 8:18 pm

banana

Tweeted by Olivier Croisier with this comment:

Looks like naming things is hard not only in computer science…

Naming (read identity) problems are everywhere.

Our intellectual cocoons prevent us noticing such problems very often.

At least until something goes terribly wrong. Then the hunt is on for a scapegoat, not an explanation.

April 23, 2014

Sabotage (Former U.S. Government Secret Manual)

Filed under: Humor,Security — Patrick Durusau @ 1:52 pm

From the CIA Simple Sabotage Field Manual (Strategic Services Field Manual No. 3)

From the manual:

(a) Organizations and Conferences

(1) Insist on doing everything through “channels.” Never permit short-cuts to be taken in order to expedite decisions.

(2) Make “speeches.” Talk as frequently as possible and at great length. Illustrate your “points” by long anecdotes and accounts of personal experiences. Never hesitate to make a few appropriate “patriotic” comments.

(3) When possible, refer all matters to committees, for “further study and consideration.” Attempt to make the committees as large as possible — never less than five.

(4) Bring up irrelevant issues as frequently as possible.

(5) Haggle over precise wordings of communications, minutes, resolutions.

(6) Refer back to matters decided upon at the last meeting and attempt to re-open the question of the advisability of that decsion.

(7) Advocate “caution.” Be “reasonable” and urge your fellow-conferees to be “reasonable” and avoid haste which might result in embarrassments or difficulties later on.

(8) Be worried about the propriety of any decision — raise the question of whether such action as is contemplated lies within the jurisdiction of the group or whether it might conflict with the policy of some higher echelon.

Judging from the markings on the PDF file, the document containing the quoted material was classified at some level, from January, 1944 until April of 2008.

Over sixty (60) years as a classified document. To conceal, in part, a description of “sabotage” that can be observed at every level of government and in the vast majority of organizations.

One potential update to the manual:

Disrupting network connectivity: Glue a small ceramic magnet to a computer next to the Ethernet connector. Best if the magnet has a computer related logo. If you have access to the inside of the computer, glue it on the inside next to the Ethernet connector.

I first saw this at The CIA guide to sabotage by Chris Blattman.

PS: Untested but you could start with the 1/8 inch cube magnets from Apex Magnets. Strictly for educational purposes of course.

April 16, 2014

Hitchhiker’s Guide to Clojure

Filed under: Clojure,Functional Programming,Humor,Programming — Patrick Durusau @ 8:31 pm

Hitchhiker’s Guide to Clojure

From the webpage:

The following is a cautionary example of the unpredictable combination of Clojure, a marathon viewing of the BBC’s series “The Hitchhiker’s Guide to the Galaxy”, and a questionable amount of cheese.

There have been many tourism guides to the Clojure programming language. Some that easily come to mind for their intellectual erudition and prose are “The Joy of Touring Clojure”, “Touring Clojure”, “Clojure Touring”, and the newest edition of “Touring Clojure Touring”. However, none has surpassed the wild popularity of “The Hitchhiker’s Guide to Clojure”. It has sold over 500 million copies and has been on the “BigInt’s Board of Programming Language Tourism” for the past 15 years. While, arguably, it lacked the in-depth coverage of the other guides, it made up for it in useful practical tips, such as what to do if you find a nil in your pistachio. Most of all, the cover had the following words printed in very large letters: Don’t Worry About the Parens.

To tell the story of the book, it is best to tell the story of two people whose lives were affected by it: Amy Denn, one of the last remaining Pascal developers in Cincinnati, and Frank Pecan, a time traveler, guidebook researcher, and friend of Amy.

There isn’t any rule (that I’m aware of) that says computer texts must be written to be unfunny.

I think my only complaint is that the story is too short. 😉

Enjoy!

April 14, 2014

SIGBOVIK 2014

Filed under: Humor — Patrick Durusau @ 10:14 am

SIGBOVIK 2014 (pdf)

From the cover page:

The Association for Computational Heresy

presents

A record of the Proceeding of

SIGBOVIK 2014

The eight annual intercalary robot dance in celebration of workshop on symposium about Harry Q. Bovik’s 26th birthday.

Just in case news on computer security is as grim this week as last, something to brighten your spirits.

Enjoy!

I first saw this in a tweet by John Regehr.

April 13, 2014

Will Computers Take Your Job?

Filed under: Data Analysis,Humor,Semantics — Patrick Durusau @ 10:42 am

Probability that computers will take away your job posted by Jure Leskovec.

jobs taken by computers

For your further amusement, I recommend the full study, “The Future of Employment: How Susceptible are Jobs to Computerisation?” by C. Frey and M. Osborne (2013).

The lower the number, the less likely for computer replacement:

  • Logisticians – #55, more replaceable than Rehabilitation Counselors at #47.
  • Computer and Information Research Scientists – #69, more replaceable than Public Relations and Fundraising Managers at #67. (Sorry Don.)
  • Astronomers – #128, more replaceable than Credit Counselors at #126.
  • Dancers – #179? I’m not sure the authors have even seen Paula Abdul dance.
  • Computer Programmers – #293, more replaceable than Historians at #283.
  • Bartenders – #422. Have you ever told a sad story to a coin-operated vending machine?
  • Barbers – #439. Admittedly I only see barbers at a distance but if I wanted one, I would prefer human one.
  • Technical Writers – #526. The #1 reason why technical documentation is so poor. Technical writers are under appreciated and treated like crap. Good technical writing should be less replaceable by computers than Lodging Managers at #12.
  • Tax Examiners and Collectors, and Revenue Agents – #586. Stop cheering so loudly. You are frightening other cube dwellers.
  • Umpires, Referees, and Other Sports Officials – 684. Now cheer loudly! 😉

If the results strike you as odd, consider this partial description of the approach taken to determine if a job could be taken over by a computer:

First, together with a group of ML researchers, we subjectively hand-labelled 70 occupations, assigning 1 if automatable, and 0 if not. For our subjective assessments, we draw upon a workshop held at the Oxford University Engineering Sciences Department, examining the automatability of a wide range of tasks. Our label assignments were based on eyeballing the O∗NET tasks and job description of each occupation. This information is particular to each occupation, as opposed to standardised across different jobs. The hand-labelling of the occupations was made by answering the question “Can the tasks of this job be sufficiently specified, conditional on the availability of big data, to be performed by state of the art computer-controlled equipment”. Thus, we only assigned a 1 to fully automatable occupations, where we considered all tasks to be automatable. To the best of our knowledge, we considered the possibility of task simplification, possibly allowing some currently non-automatable tasks to be automated. Labels were assigned only to the occupations about which we were most confident. (at page 30)

Not to mention that occupations were considered for automation on the basis of nine (9) variables.

Would you believe that semantics isn’t mentioned once in this paper? So now you know why I have issues with its methodology and conclusions. What do you think?

April 9, 2014

Scaling Graphs

Filed under: Graphics,Humor — Patrick Durusau @ 4:28 pm

Fox News

If you ever wonder why your data stream is “dirty,” I have an explanation.

I first saw this in a tweet by Scott Chamberlain.

April 1, 2014

April Fools’ Day: The 7 Funniest Data Cartoons

Filed under: Humor — Patrick Durusau @ 7:17 pm

April Fools’ Day: The 7 Funniest Data Cartoons

R-Bloggers had the best April Fools’ Day post I encountered today.

I think Scott Adams must have known one of my former managers.

Enjoy!

March 31, 2014

Speaking of Not Lying

Filed under: Humor — Patrick Durusau @ 8:38 pm

Financial Institutions Leverage Metadata Driven Modeling Capability Built on the Oracle R Enterprise Platform to Accelerate Model Deployment and Streamline Governance

Oracle released a buzz word laden announcement on 25 March 2014, that anticipated Rebekah Campbell‘s post on lying by saying:

Financial institutions continue to expand their use of statistical models across the enterprise. In addition to their long-standing role in risk management, models are increasingly the foundation for customer insight and marketing, financial crime and compliance and enterprise performance management analytical applications. As a result, organizations are spending more time and resources creating and validating models, improving data quality, verifying results and managing and governing the use of models across the enterprise. (emphasis added)

I have never seen a vendor advertise their software as being useful for financial crime.

Do you know what sort of EULA that software ships under?

BTW, what other parts of this announcement seem a bit shaded to you?

I first saw this in a tweet by Bob DuCharme.

March 5, 2014

Dumb, Dumber, Dumbest

Filed under: Humor,Interface Research/Design — Patrick Durusau @ 2:03 pm

There are times when the lack of quality in government and other organizations seems explainable: People work there!

From recent news stories:

Dumb:

18% of people fall for phishing emails. Hacking Critical Infrastructure Companies – A Pen Tester View

Dumber:

11% of Americans think HTML is a sexually transmitted disease. 1 in 10 Americans think HTML is an STD, study finds

Dumbest:

An elementary school principal:

responded to a Craigslist advertisement over the weekend and talked with an undercover officer who posed as a child’s mother looking to arrange for a man to meet her teenage daughter. (Bond set for Douglas County principal arrested in sex sting)

It’s been a while since I was a teenager but I don’t remember any mothers taking out ads in the newspaper for their daughters. Do you?

Take this as a reminder to do realistic user testing of interfaces.

  1. Pick people at random and put them in front your interface.
  2. Take video of their efforts to use the interface for the intended task(s).
  3. Ask what about your interface confused the user?
  4. Fix the interface (do not attempt to fix the user, plenty more where that one came from)
  5. Return to step 1.

February 18, 2014

James Iry’s history of programming languages

Filed under: Humor,Programming — Patrick Durusau @ 1:13 pm

James Iry’s history of programming languages (illustrated with pictures and large fonts)

To quote Alex Popescu‘s tweet: “This is truly a masterpiece:”

Enough said. Enjoy!

February 9, 2014

Snowden Used Low-Cost Tool to Best N.S.A.

Filed under: Cybersecurity,Humor,NSA,Web Scrapers,Webcrawler — Patrick Durusau @ 4:47 pm

Snowden Used Low-Cost Tool to Best N.S.A. by David E. Sanger and Eric Schmitt.

From the post:

Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.

Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.”

The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyberattacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.

Moreover, Mr. Snowden succeeded nearly three years after the WikiLeaks disclosures, in which military and State Department files, of far less sensitivity, were taken using similar techniques.

Mr. Snowden had broad access to the N.S.A.’s complete files because he was working as a technology contractor for the agency in Hawaii, helping to manage the agency’s computer systems in an outpost that focuses on China and North Korea. A web crawler, also called a spider, automatically moves from website to website, following links embedded in each document, and can be programmed to copy everything in its path.
….

A highly amusing article that explains the ongoing Snowden leaks and perhaps a basis for projecting when Snowden leaks will stop….not any time soon! The suspicion is that Snowden may have copied 1.7 million files.

Not with drag-n-drop but using a program!

I’m sure that was news to a lot of managers in both industry and government.

Now of course the government is buttoning up all the information (allegedly), which will hinder access to materials by those with legitimate need.

It’s one thing to have these “true to your school” types in management at agencies where performance isn’t expected or tolerated. But in a spy agency that you are trying to use to save your citizens from themselves, that’s just self-defeating.

The real solution for the NSA and any other agency where you need high grade operations is to institute an Apache meritocracy process to manage both projects and to fill management slots. It would not be open source or leak to the press, at least not any more than it does now.

The upside would be the growth, over a period of years, of highly trained and competent personnel who would institute procedures that assisted with their primary functions, not simply to enable the hiring of contractors.

It’s worth a try, the NSA could hardly do worse than it is now.

PS: I do think the NSA is violating the U.S. Constitution but the main source of my ire is their incompetence in doing so. Gathering up phone numbers because they are easy to connect for example. Drunks under the streetlight.

PPS: This is also a reminder that it isn’t the cost/size of the tool but the effectiveness with which it is used that makes a real difference.

January 23, 2014

Data Citation Implementation Group

Filed under: Citation Practices,Humor — Patrick Durusau @ 7:33 pm

Data Citation Implementation Group

I try to capture “new” citation groups as they arise, mostly so if I encounter the need to integrate two or more “new” citations I will know where to start.

I thought you might be amused at this latest edition to the seething welter of citation groups:

You must be a member of this group to view and participate in it. Membership is by invitation only.

This group is invite only, so you may not apply for membership.

So, not only will we have:

Traditional citations

New web?-based citations

but also:

Unknown citations.

😉

Data integration, like grave digging, is an occupation with a lot of job security.

January 20, 2014

Digital Humanities?

Filed under: Humanities,Humor — Patrick Durusau @ 3:32 pm

xkcd on digital humanities

I saw this mentioned by Ted Underwood in a tweet saying:

An xkcd that could just as well be titled “Digital Humanities.”

Not to be too harsh on the digital humanists, they have bad role models in programming projects, the maintenance of which is called “job security.”

January 7, 2014

Hash Tags

Filed under: Humor — Patrick Durusau @ 6:40 pm

hash tags

The mouse over doesn’t work with the embedded image. Mouse over should display:

“The cycle seems to be ‘we need these symbols to clarify what types of things we’re referring to!’ followed by ‘wait, it turns out words already do that.'”

Could it be that computer languages are pigdin languages? Languages that lack the richness of natural languages? That could explain the duplication of some symbols. 😉

I first saw this at Greg Linden’s Quick links, January 2, 2014.

« Newer PostsOlder Posts »

Powered by WordPress