Review (Guest): Scripting Intelligence – Web 3.0 Information Gathering and Processing

4 Star, Information Technology, Intelligence (Public), Intelligence (Wealth of Networks)
0Shares
Amazon Page
Amazon Page

Mark Watson

4.0 out of 5 stars Ruby-centric tutorials on Semantic Web, Natural Language Processing, and Large-Scale Data Storage and Processing Technologies July 4, 2009

ByTechie Evan

This four-part book is focused on programming techniques and technologies that in the author's opinion can help next generation web applications handle data more “intelligently”. The code samples are implemented in Ruby (and a little bit of Java).

Continue reading “Review (Guest): Scripting Intelligence – Web 3.0 Information Gathering and Processing”

Review (Guest): Algorithms of the Intelligence Web

5 Star, Information Technology, Intelligence (Public), Intelligence (Wealth of Networks)
0Shares
Amazon Page
Amazon Page

Haralamlos Marmanis and Dmitry Babenko

5.0 out of 5 stars A soon to be classic Algo book for improving intelligent web applications June 19, 2009

By Michael Mimo I have always had an interest in AI, machine learning, and data mining but I found the introductory books too mathematical and focused mostly on solving academic problems rather than real-world industrial problems. So, I was curious to see what this book was about.

I have read the book front-to-back (twice!) before I write this report. I started reading the electronic version a couple of months ago and read the paper print again over the weekend. This is the best practical book in machine learning that you can buy today — period. All the examples are written in Java and all algorithms are explained in plain English. The writing style is superb!

Continue reading “Review (Guest): Algorithms of the Intelligence Web”

OSINT Literature Review, Name Association, Lessons Learned

IO Impotency
0Shares
Got Crowd? BE the Force!
Got Crowd? BE the Force!

Tough love, this is.

Lessons Learned from a 22 Year Fight:

01 Steele’s biggest mistake was in not ensuring OSS conference presentations were indexed in Conference Proceedings. Core value of presentation at International Studies Association (Intelligence) is that papers presented there are indexed and visible.

02 International Journal of Intelligence and Counterintelligence, American Intelligence Review, and SIGNAL not indexed. Materials published there are not visible.

Continue reading “OSINT Literature Review, Name Association, Lessons Learned”

Jean Lievens: How to Design for the Sharing Economy

Design, Economics/True Cost, P2P / Panarchy
0Shares
Jean Lievens
Jean Lievens

How To Design For The Sharing Economy

How do you create the next Zipcar, Netflix, or Airbnb? Follow these five rules, from Artefact’s Lada Gorlenko.

The definition of ownership is changing. We are becoming less interested in owning products and accumulating wealth through long-term purchases. Instead, we crave experiences, seeking out things without much of a financial or time investment, and have a newfound appreciation of bargains and second-hand possessions (a song about thrifting is leading the Billboard charts as I am writing this). We increasingly consume products and services through renting, sharing, and purchasing subscriptions. Being “socially connected” is no longer just about having a lot of people to share your news with; these days, it’s about having a lot of people to share your stuff with–either for free or at a fraction of the market fee. It’s about collaborative consumption.

. . . . . . .

Collaborative consumption is growing from a trend for the young and urban to a viable alternative for everyone. From renting a movie online (e.g., Netflix) to renting a stranger’s couch (e.g., Couchsurfing), the economy of sharing changes the way we behave, consume, seek new options, and commit to decisions. The phenomenon is not just about getting access to new cars and the latest movies; it’s also about creating a new type of peer-to-peer commerce, making meaningful connections, and establishing a sense of trust among those involved.

Read full article.

Continue reading “Jean Lievens: How to Design for the Sharing Economy”

Stephen E. Arnold: IBM’s Watch Goes Shopping — Big Data Heuristics Hit a New Low

IO Impotency, IO Sense-Making, IO Tools
0Shares
Stephen E. Arnold
Stephen E. Arnold

IBM Watson Apps Due Next Year

December 22, 2013

To what pressing issue is IBM now applying Watson’s superior (artificial) intellect? Why, to shopping, of course. Business Insider reports, “IBM’s Jeopardy-Winning Supercomputer Will Power a ‘Cognitive, Expert Personal Shopper’ App Next Year.” Writer Dylan Love was especially taken by one app on the horizon from a firm called Fluid Retail.

He quotes IBM Watson Solutions VP Stephen Gold:

Continue reading “Stephen E. Arnold: IBM's Watch Goes Shopping — Big Data Heuristics Hit a New Low”

SchwartzReport: Truths That Matter

Commercial Intelligence, Cultural Intelligence
0Shares
Stephan A. Schwartz
Stephan A. Schwartz

We have gone from a country that took pride in its science and in being a fact-based society to one where a MAJORITY of Americans think science is just another opinion of no particular distinction. It has taken 30 years of Theocratic Rightist disinformation, fake thinktank reports, and agit-prop to achieve this bleak result. Combined with decreasing educational outcomes, and the corporate corruption of the peer! review process by pharmaceutical and agricultural chemical corporations and you have a formula for willful ignorance and an easily manipulated electorate.

Americans Have Little Faith In Scientists, Science Journalists: Poll
EMILY SWANSON – The Huffington Post

In a new HuffPost/YouGov poll, only 36 percent of Americans reported having “a lot” of trust that information they get from scientists is accurate and reliable. Fifty-one percent said they trust that information only a little, and another 6 percent said they don't trust it at all.

Phi Beta Iota: This is huge. The bottom line is that every one of the eight tribes of information has lost their integrity and in so doing, lost the trust of the public.

Because we have breached the firewall the Founders put in place to separate church and state we are now left with this.

Charts: Catholic Hospitals Don't Do Much for the Poor
STEPHANIE MENCIMER – Mother Jones

It is very difficult to see how the Rightists on the Supreme Court could not understand or foresee that gutting the Voting Rights Act would lead to voter suppression. It is much easier to understand their decision from the perspective that this was their deliberate purpose. In any case, the research is now coming in, as this report recounts, an! d it all confirms what was obvious: all voting restriction bills passed in the Red value states have one purpose: to decrease the number of people of color, seniors, students, and poor people voting. Which is to say its purpose is to rig the elections to give Republicans a better chance of winning. It is just the second phase of the effort that began with gerrymandering.

Researchers Find Factors Tied To Voting Restriction Bills Are ‘Basically All Racial'
ERICH LACH – Talking Points Memo/Perspectives on Politics

Chuck Spinney: Mission Accomplished in Afghanistan — Treason, Looting of the Commonwealth, Destruction of the Millitary, and Wanton Collateral Damage…

Corruption, Government, Military
0Shares
Chuck Spinney
Chuck Spinney

Below, Seumas Milne well summarizes the calamitous results of our misbegotten GWOT* crusades in Afghanistan, Iraq, Libya, and Syria.  The result is not pretty, but that is hardly surprising.

While Milne's call for accountability applies to the British contribution to the GWOT, it bespeaks volumes for the United States — a country that prides itself on its Constitutional system of Checks and Balances.  Our self-referencing image begs the question: Given our sorry performance in the GWOT, what kind of checks in balances have been put into play on Capital Hill? Who in America is being held accountable for this debacle?

Certainly not the Pentagon or the Military-Industrial-Congressional Complex (MICC).

That is because the GWOT disaster has a golden lining — at least for some — it ratcheted up the cash flowing into the MICC to record levels, and more importantly, the long duration of GWOT provided time need by the MICC to weave its social safety net more deeply into our political economy via the time honored expedient of politically engineering the flow of dollars, jobs, and profits to virtually every congressional district in the United States and, let us not forget, Puerto Rico.  Traditionally, political engineering has been the province of major weapons procurement, like the F-35; but the massive shift to privatization in the Pentagon's the Operations and Maintenance budget quietly opened a cornucopia of new political engineering opportunities for insinuation into heretofore unexploited fiscal regions, making the GWOT the gift that will keep on giving — at least until Obama's pivot to Asia solidifies a sufficiently solid budgetary foundation for a new Cold War.

Continue reading “Chuck Spinney: Mission Accomplished in Afghanistan — Treason, Looting of the Commonwealth, Destruction of the Millitary, and Wanton Collateral Damage…”