News Media: Where the Ad Dollars Are Going

Pew_news-media_june2016

PewResearchCenter:

It has been evident for several years that the financial realities of the web are not friendly to news entities, whether legacy or digital only. There is money being made on the web, just not by news organizations. Total digital ad spending grew another 20% in 2015 to about $60 billion, a higher growth rate than in 2013 and 2014. But journalism organizations have not been the primary beneficiaries. In fact, compared with a year ago, even more of the digital ad revenue pie – 65% – is swallowed up by just five tech companies. None of these are journalism organizations, though several – including Facebook, Google, Yahoo and Twitter – integrate news into their offerings. And while much of this concentration began when ad spending was mainly occurring on desktops platforms, it quickly took root in the rapidly growing mobile realm as well.

Increasingly, the data suggest that the impact these technology companies are having on the business of journalism goes far beyond the financial side, to the very core elements of the news industry itself. In the predigital era, journalism organizations largely controlled the news products and services from beginning to end, including original reporting; writing and production; packaging and delivery; audience experience; and editorial selection. Over time, technology companies like Facebook and Apple have become an integral, if not dominant player in most of these arenas, supplanting the choices and aims of news outlets with their own choices and goals.

The Atlantic:

“There’s still a bunch of stuff on the web. The stuff we read everyday, the stuff you write, is on the web. And that’s great,” says [Medium founder Ev] Williams. … “There’s still the fact that anyone, at any time, can create their own website and start publishing, and they have a voice—I mean that’s the idea that I got really excited about almost 20 years ago.”

“I think that will continue. I think the openness of voices is not going to consolidate back to the old days of media,” he told me. “I think the distribution points are going to consolidate.”

The distribution points are the search engines and the social networks: Facebook, Google, Twitter, Snapchat, and the messaging apps. Also on that list are YouTube (owned by Google), Instagram (owned by Facebook), Whatsapp (also owned by Facebook), and Facebook Messenger (ditto). By linking the web together, or hosting normally data-heavy content for free, these distribution nodes seize more and more users. And because each of the nodes is more interesting than any one individual’s personal site, people who used to go to personal sites wind up at the nodes instead.

As Williams puts it: “Primarily what we’ve seen is that the social networks have gotten really, really big, and they drive more and more of our attention.” With this size, they also collect more revenue: 85 cents of every new dollar in online advertising went to Google or Facebook in early 2016, according to a Morgan Stanley analyst quoted by The New York Times.

“That could be bad,” says Williams, in his low-key way.

Posted in Misc | Tagged | Leave a comment

Israeli Startups Disrupting the Car Industry

Israel_car_startups

There are more than 150 automotive startups and research groups in Israel, almost 100% growth over the last 4 years. Over the last 2 years, car-related startups have raised $820 million.

Posted in Misc | Leave a comment

Artificial Intelligence Startups in Healthcare

CBInsights_AI-healthcare-Q2-16

CB Insights:

The startups [above] have raised more than $870M in aggregate funding since 2011.

This year has seen some notable deals involving companies on the map: New York-based AiCure raised $12.3M in Series A funding and London-based health services startup, Babylon Health, raised a $25M Series A round from investors including Google-owned DeepMind Technologies and Hoxton Ventures. Babylon will reportedly roll out a Siri-like voice recognition interface this year. The largest round so far in 2016 (as of 5/24/2016) was raised by China-based iCarbonX ($154M Series A round).

 

Posted in AI, deep learning, Machine Learning, startups | Tagged | Leave a comment

What Are Amazon Echo, Apple Siri and Google Now Good For?

Voice_assistance

Posted in Misc | Leave a comment

600+ companies investing in deep learning

DeepLearing_investment

DeepLearning_investments

 

O’Reilly Data:

…more than 600 companies have jumped into applying deep learning with real budgets. …about 90 companies (level 3), have made strategic investments in deep learning for their businesses. Another 177 companies (level 2) are developing projects using deep learning with dedicated resources in staff. And more than 350 companies (level 1) are experimenting with deep learning in their labs.

Given how early deep learning is as a technology, the majority of companies investing in deep learning are IT and software businesses. However, we discovered interesting champions in other industries that are adopting deep learning as well. [Above] are some examples of companies that are not in traditional software or IT businesses, but that are adopting deep learning. Given that deep learning has early roots in image processing, it is exciting to see health care companies like Siemens Healthcare and GE Healthcare leading the pack, along with research institutions like the NIH and Lawrence Livermore National Labs.

 

Posted in deep learning | Tagged | Leave a comment

A Few Internet of Things (IoT) Facts (Infographic)

IoT_facts_infographic.jpg

Posted in Internet of Things | Leave a comment

Why the Growing Threat of Ransomware is Good for You

“Unbelievable” is what FBI Cyber Division Assistant Director James Trainor called last week the increase in the amount and sophistication of ransomware attacks in the first quarter of 2016, according to CIO Journal.

Last year, there were 2,453 reported ransomware incidents in the U.S., in which victims paid about $24.1 million. We can expect much more in 2016, says the FBI, defining ransomware as “an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them.”

Yaki_Varonis

Yaki Faitelson, CEO, Varonis

Yaki Faitelson, CEO of Varonis, sees a silver lining in the changing threat environment. Ransomware, he argues, is the only type of cybersecurity infiltration where the attackers want their presence to be known, typically shortly after succeeding in obtaining access to the victim’s files and encrypting them.

”Ransomware is very vocal,” says Faitelson, “but it acts exactly like other malicious insider threats.” As such, it can serve as a sort of cybersecurity training exercise, exposing to the victims specific vulnerabilities in their defenses.

“This is what we call security from the inside out,” says Faitelson. “Nearly all data breaches come, in one form or another, from insiders.” Data breaches can originate with a disgruntled employee or one seeking a material gain. But for the most part, they are the result of inadequate management of data access permissions compounded by innocent mistakes committed by insiders, such as clicking on an e-mail with a malware attachment.

You may think that with all the publicity about “phishing” attempts, people are much more careful about opening email attachments from unknown sources. But the 2016 Data Breach Investigations Report found that 30% of phishing messages were opened, up from 24% last year, and that 12% of email users went on to click the malicious attachment.

An additional fuel to the ransomware fire is its increased sophistication, now spreading to your organization not only via email but also with the help of infected websites, taking advantage of unpatched software on end-user computers.

So what’s the best protection? “Ransomware is about backups, more so than anything else,” says the FBI’s Trainor. Faitelson begs to differ.  “Most organizations don’t have effective backup,” he says. Their physical backup is not up-to-date and is costly to recover. Their up-to-date backup files are increasingly being targeted by the ransomware attackers who make sure to encrypt them as well.

Instead of relying solely on physical backup, Varonis recommends constant monitoring of the IT infrastructure, looking for mass encryption beyond a certain threshold and looking for the typical extensions that the ransomware software creates.

“The best way to find today’s sophisticated attackers is user behavior analytics, understanding what is normal and what is not, identifying behavioral anomalies for accounts that are targeted by hackers,” says Faitelson.

User behavior analytics is a relatively new cybercrime-fighting tool for Varonis and the industry.  Realizing that protecting the perimeter and the endpoints of the IT infrastructure is not enough, the industry is moving rapidly to developing and providing machine learning tools that detect anomalies and alert security staff to unusual activity. Faitelson argues that Varonis has a headstart in this field as it has been monitoring and analyzing how users interact with data and file systems since 2005.

Before he and Ohad Korkus founded Varonis, they worked in professional services for NetApp. While implementing a project in Angola for a large energy exploration firm, someone deleted many critical files: images taken from the ocean floor at great expense.  Attempting to find out who deleted the files became a monumental task.

It was then that they realized that enterprises needed a much better way to track, visualize, analyze and protect their data. That led to Varonis’ initial focus on data management, on understanding, mapping, and organizing data ownership, rights, and responsibilities across the enterprise.

That decade-plus experience, specifically the gathering and analyzing of metadata, data about the data, its use, and users’ interactions with it, now informs the algorithms and automated rules Varonis uses to identify abnormal behavior without generating lots of distracting “false positives,” alerts triggered by benign activity. Given the 33% revenue growth announced by Varonis last week, the move to applying its data management expertise to cybersecurity seems to be working.

Ransomware may be changing the dynamics of cyber defense, but it may also change how organizations value their information. That maybe another ransomware silver lining: It quantifies, in monetary terms, what it costs not to have access to specific records and files. Says Faitelson: “Ransomware shows the organization the value of the data.”

Originally published on Forbes.com

Posted in Misc | Tagged | Leave a comment

10 Inventions Predicted By The Simpsons (Video)

[youtube https://www.youtube.com/watch?v=ndTglH25dDY?rel=0]

Posted in Misc | Leave a comment

Where should you put your data scientists?

[slideshare id=61486991&doc=whereshouldyouputyourdatascientists-160429025555]

Posted in Data Science Careers, Data Scientists | Leave a comment

The Economic Impact of the Internet of Things

IoT_economic impact

Source: Digitlistmag

Posted in Internet of Things | Leave a comment