Artificial Intelligence: Tuning with a Content Index And Predictive Models

As I was reading an All Things Digital article, Artificial-Intelligence Professor Makes a Search App to Outsmart Siri, there was a statement that made:

“We memorize the dictionary to read the Library of Congress,” he said. “Siri is trying to memorize the Library of Congress.”


A tool more commonly used in the past, in books, at the end of a book, an index of where the words appeared in the book was noted with page numbers.  Classic rules engines is ‘data in a black box’, searchable within the context they appear. The more put into the black box, users can search on ‘rules’ or content, and in precedence, an action occurs, or the content that is searched appears.  If there are cross-references with an associated category or tag with ‘each line of data’ or ‘rule’ that will enable the Artificial Intelligence engine to be more efficient.  Therefore the correlations of ‘data to other data’ with similar or like tags enables an Artificial Intelligence will be more intelligent.  In theory, categorized or tagged content indexed to references of the data points should fine tune the engine.

An addition theory, allows for predictive models to produce refined searches, or rules.  You can make a predictive model, where the intelligence of the user actually refines the engine. The user can ask a question, and as they refine their question, a predictive model,  may allow for refined user output.  If a user is allowed to participate and tag data search output, the search output could be more granular, like a refined Business Intelligence drill down.  The output of a search, for example, can contain a title, brief summary, and tags that can be added or removed (by the user), which allows for a more robust search, and predictive model; however, you are relying on the user to a) not be malicious, and b) have understanding of what information he is search for within the data.  If web crawlers, or if the webmaster submits URLs with tags, the meta data tags of the page, the black box or Artificial Intelligence rules engine will, if properly submitted, or indexed, correlate the data.  To most people, this is AI or Search Engine 101.  Some people cheat, and add pages with false meta data tags because they want their site to appear in a higher order, or precedence and they may make more revenue with advertising dollars.

There are multiple ways around trying to cheat an Artificial Intelligence Content Index:

  • Hit Ratio: People searching on the same question over and over increase the ‘score’ ratio, thus pushing the false results downward on the list, or removing them entirely.
  • Enlist ‘quality’ users, who are known quantities, such as like Twitter ‘certifies’ certain users.  You may apply for ‘relatively’ unbiased, certification status, such as people who have reputations and certifications in the field, are qualified to ‘enhance’ tags, and improve upon your result outputs. e.g Professors, Statisticians,
  • Enlist users who will actually derive revenue, if their ‘hit ratio’ score delta increases exponentially some N number.  These tags are classified as unverified, however, the people are monetarily motivated to increase peoples’ probably of success to find what people are looking for when other users search the tags become qualified as the results of the tags attract users to their content.  If they are using, let’s say, a browser, which the search engine company owns, such as Chrome, a little plug in can appear and say, was this what you were looking to find, yes or no.

Best Password Encryption, Tight As a Singularity

So I was perusing this article in the New York Times, How to Devise Passwords That Drive Hackers Away, and saw this picture, sorry NYT, I paid my subscription, so if you want, I will yank out the picture, let me know, else I will consider public domain.  See the below image.  That’s when I said, wow, neat idea. It’s like those Hershey’s Reese’s pieces commercials, peanut butter and chocolate, well, look at the below image, now if the user can use a Hasbro® Rubik’s Cube type device, that fits on your key chain, like an RSA key, and turns the 6 sides of the cube to the right combination.  The Cube can be the size that fits in the palm of your hand.  You set the key with all different colors, and letter combinations, then place it in a small docking station, which attaches to the computer via a USB slot.  Even add a sensor in the middle of the cube center square  which reads your finger print, and poof.  It gets stolen, no problem, don’t have your finger print, and the letter combinations on the colors help you remember the order.  So how strong is a 6 sided cube with 9 inner squares, an alphanumeric character overlay, and optionally a finger print reader?  You can also make it an application using 3 dimensional software to manipulate the object, hey, throw in Google Glasses, you can manipulate that object in virtual space.  Easy implementation, is the 3 dimensional graphics generator and optionally use the finger print reader already on your computer, if you feel it is reliable.  I liked the portability of the physical object, such as a physical, compact cube that fits in your hand and a docking station.  To knock it out of the park, put in SD memory into the card, and then you can use it to transport information.  The bits of information are only stored on a particular point within a cube, once the pattern is locked, so it would be necessary to have the combination to access the information.  Secure, on the go, information, and probably cheap to manufacturer.  You of course, can expand the number of cubes on each side, color variations.  Of course, depending on the set of alphanumeric characters you allow increases the encryption protection. Also, for ease, of use, you may align up corners, and only remember 24 characters, six (sides) times four (corners).

A simple 9 squared cube,
One bit associated with each combination (1/0)
1st bit) 6 sides times 9 squares = 54 total squares,
2nd bit) 54 total squares (Red,Yellow,Green,Blue) times 4 colors = 216
3rd bit) 216 times 128 (e.g.7F) ASCII Hex combinations = 27,648 potential combinations

Equals three bit combinations, which can then be applied with software to cycle the bits, increase the number of bits.  A utility like this can be easily manufactured, implemented and integrated with any applications (e.g. email) with a flexible Security API

As compared to today’s Advanced Encryption Standards,
256 bits times 14 cycles using the latest encryption (ASE) = 3,584 bits

Rubik's Cube
Encryption Key with USB and Optional Finger Reader

Silicon Valley is Pushing Back On Children’s Privacy. Should They? Here is a Brief Case Study

I just read a piece from the New York Times,  A Trail of Clicks, Culminating in Conflict, and I must say I agree with advanced privacy protection for children.  I created a start-up a few years ago, mobile application, that allowed the sharing of image posts, and the woman at RIMM was on the cusp of rejecting the app, or wanted me to change the rating of the application.  I have to say that, at the time, I was on a shoe string budget, and time was money.  Annoyed, and a bit frustrated, I attempted to express that the program was designed to enable antique dealers to get on line appraisals, for example, on the go..  So if you liked garage sales, or flea markets, but didn’t know the estimated value, using the mobile application, you could look up a registered expert in that area of antiques, and send them a request for an instant appraisal.  If the appraiser had the app they would get a notification and/or a text message notifying them a request for an appraisal was sent to them, then could offer their services for a price, then respond with comments, and it could all be paid through mobile payments.  Sounds innocent enough; however, the RIMM representative insisted it could be used for pornographic use.  I slept on it that night, and as a father of two girls, it appeared to me she was absolutely right, the best of intentions, and all, so we changed the rating of the application in their store and published the application.  This is just an example, and may appear to be an apples and oranges comparison; however, it’s more alike than one thinks.  Alluring children on television during a programming session of their favorite T.V. show is targeting a demographic and is allowed, and although has a precedence, the demographic targeting of advertisements, for example, has never been able to be as fine tuned as it can be today, and the ramifications to a child relative to a conditioned adult has consequences to shape a child’s mind, or theoretically using a form of AI rules engine to fine tune their preferences seems benign enough.  However, the child may be influenced by trends that are imposed upon them, rather than the contrary.  I am not studying the affects that an AI rules engine with induction predictive capabilities may have on a child as a child psychologist, with a background in technology, but I think several studies are warranted, and I hear a few thesis papers inking pen to paper now.  These studies should be jointly done by the FCC and the CDC.  It sounds drastic, although, the consequences of a physiological epidemic are just as troubling.  I have news for you, most of these start-ups are by kids themselves, relatively, without their own children, and do not consider the ramifications, just the dollar signs.  We should ask, although I can do it, should I?

Google to Offer Educators Ways To Earn Money with Online Platform

Anyone can see that a user may Sign into Google Plus, and a user may create a page, and that page, can have a ‘Hangout’, however, this loosely termed virtual place may be used for video interaction, chat, voice, and they even have plug ins to add applications, such as third party interfaces, share screens, all for free.  I am able to see a time when Google Plus enables people to have paid ‘hangouts’, or arenas, where let’s say you wanted to earn continuing education credits to keep up a certification, such as earning Professional Development Units (PDUs), which a certified Project Management Professional (PMP)® is required to earn to maintain their certification.  As an accredited on line educator, I may be able, some time in the future, to create a Google Plus Page, which is an introduction to my credentials, and then, using Google Wallet, I can pay for a course, which entitles me to either a pre-recorded certification session, or a live session, and both may have tiered pricing, and the live interaction with the educator may require more money.  In addition to this, if there are shared screens, and a user may ‘take over’ another computer, an independent computer technician, anywhere in the world, may offer their paid services as well.  Any continuing education, for semi retired professors, to mechanics to music or math tutors, sky is the limit.  The better accreditation may attract more clients, as well as ratings, pricing, and of course, you, in the future, may be able to advertise your services either through Google Search, Google Plus pages, and so on.  Hat’s off to you Google.  Still waiting for that job offer. 🙂  I am presuming that either the [software/hardware] platform has not been built out yet, and / or components have not been integrated.  Again, my compliments to the New York Times for the thought provoking article, The Year of the MOOC

Categorizing and Prioritizing Notifications : Get the Noise Out of Google Plus and Twitter

I really like the spinning red wheel, especially when it gets to 99+, but when you select ‘View Notifications’, you get this droned list of notifications, there has to be some way, in this case to accentuate some of the notifications, maybe +1, are another color than some you’ve commented on.  There is so much information, that  a classification, or a taxonomy would be helpful.  Even some of the comments I’ve put on someone’s Post, I am not interested in being notified if someone adds additional comments, so maybe, a ‘don’t notify’ on a particular post, does that exist, in truth, haven’t checked.  Anyway, it seems like all tweet notifications, or DMs can be easily differentiated, but all tweet notifications as well as Google Plus, or FB notifications seem to be treated equal, it’s NOISE, and we will drown in notifications and start to ignore them, and let some of the good ones pass us by.  I would say an API that allows you to filter notifications by key words, and then that central program can handle your notifications.  If there is an API for notifications, which we know Twitter has, not sure about Google Plus, but there has got to be a 3rd party tool already out there that does this  Simple rules engine. Get the noise out of your notifications and filter and/or prioritize the tweets and Google Plus notifications to want to see first.  It looks like Google Plus did some color alternations between alternate types of notifications, but its not as intuitive as it could be.

I would also like to see the Android Operating System and the Apple iOS expand out their icons to include variation of the application notification.  I don’t think this is available with the 4.01 Android OS, variants of the tweet icon, e.g., still awaiting my update from Samsung for my S3. 🙁

AI Uses Google Plus or Twitter to Identify, Predict, and Influence Trends

Anyone know of a correlation, or mapping tool that can store tags, and then correlate bits of information from the tool, such as other words from the tweet, as well as data on the Tweeter.  It gives you visually a better sense on how trends evolve, and propagate.  There would probably be a bit of simple Artificial Intelligence (AI), rules engine, and perhaps an induction engine for future trend predictions.  I’d say this would take just a little time to develop.  There has got to be something out there already.It seems like it would be straight forward to develop, and the intuitiveness of the User Interface, the technological analogy to help anyone with a basic sense of visual articulation should see the trends forming before they happen.  I have AI Uses Google Plus or Twitter to Identify, Predict, and Influence Trends been working with Artificial Intelligence officially since college, and in practical applications from database Governor to email compliance and legal tools for pattern recognition, this is a walk in the park for any person to develop.  It also means, the tools can be enhanced to influence trends, I would imagine.

WordPress Shortcode API to Cloud Storage to Sell Any Digital Intellectual Property.

So, I was a browsing, going through bills, and thinking, hey relating to my other article on Google Docs and their new API where you could use them as a data warehouse, it occurred to me.   Why can’t we have a public API for all the Cloud Storage systems like Amazon Web Services (AWS) S3 (or, create a plugin to WordPress, add E-Commerce, and you now have your own place to sell digital music, or any Digital intellectual, property store, or host your own database OLTP or OLAP.

And my bro, Fat Panda, might have been thinking the same thing.  He’s one step behind, but he will catch on.  I will try to update for ‘the cheap seats’ in a bit.

For the cheap seats, even those static files stored up in the cloud, you can use a similar model to Google Docs <-> Google Fusion where you add tabular data to storage, read,over-write, or update using home made table locking mechanism, and essentially use the cloud as a data warehouse, or even a database.  Microsoft seems to have a lead on transitional and analytical storage with Microsoft Azure, relational in nature in the cloud, but it is so much simpler than that with cloud storage, although if not implemented with ‘row’ locking,there is an issue with OLTP (On Line Transaction Processing) row level, high volume, but with OLAP, On Line Analytic Processing, not so much, analyzing the way your business does business, and profit more from your consumer data.  There are easy ways to implement row level locking for row level locking of tabular data stored in cloud storage like AWS or Box.Net,  The methods to implement row level locking for OLTP systems using storage in the cloud are easy to implement, and will remind you of old school type alternatives to supplement the AutoNumber columns in MS Access or Identity columns in SQL Server. At the end of the day to either sell digital intellectual property from a WordPress implementation, or run your entire business with a robust cloud database solution for OLTP or OLAP systems using flat file storage!  Why go through all this when the Amazons AWS and Microsoft Azure have or will yearn to start building these solutions in parallel?  Cost effective solutions, and the entire database arena monopolized by Oracle, IBM, Microsoft, and MySQL, just got extended to a whole lot of database vendors.  It may take a while, but we already know the big Gorilla in the room Google is the first to strike in this game, as a non-traditional database vendor, cloud storage provider with their updated Google Docs API, and optionally usage of their Fusion application.

YouTube Video Streams from Google Glasses with Advertising? Behind the Scenes on DVDs?

A phenomena of reality T.V. makes me come to realize that this idea may be of interest to a wide audience. Although I am personally not interested in reality television, using an image video stabilizer, I was a bit jealous yesterday. Someone was headed to the Caribbean, and I was a bit jealous for a moment, but then I became relieved because although I like the destination, the journey annoys me, but to each his or her own.  I can imagine celebrities, musicians, and anyone can put on their Google Glasses, and stream their video feed to e.g. You Tube, either sell the stream, like a singer or drummer, or even an audience member of a concert will promote their Google Glasses Stream, and even sell advertising on the bottom as YouTube currently performs with YouTube videos.  A model walking down the ‘catwalk’, and the list goes on.  Even auction you’re stream if you are a celebrity for charity?   Man, reality T.V.   Can also give a whole new meaning to behind the scenes on movie DVDs, from a Director to whomever is in a movie, cast or crew.


When Only Money Talks in SEO & Online Advertising

It seems to me in my last few years of experience, when you want to be heard on the Internet, you can have the best Keywords, Metadata, SEO Title, and Metadata, and your placement in the search IS only if you pay for the advertising to the company running the platform.  You actively pay for advertising, you go to the top of the list, and they tell you if you bid X you will be placed at #1 ranking. That should advance your hit rate in a calculation.  If you have a placement of 1, and a high click through rate on the search engine, that should also effect your placement in the search engine when you don’t advertise, if you have similar SEO keywords, metadata, and click through rate, because after all, the relevancy has not changed, so mathematically it should be at equilibrium.  It’s just how much you are paying that changes.  I will quote one of my favorite movies yet again, Moneyball.

Billy Beane: No! What’s the problem, Barry?
Scout Barry: We need three eight home runs, a hundred twenty R.B.I’s and forty seven…
Billy Beane: Aaahhh! The problem we’re trying to solve is that there are rich teams and there are poor teams, then there’s fifty feet of crap, and then there’s us. It’s an unfair game… We got to think differently.


People, we have to think differently, out of the box, if you want…full stop.  It’s like the Mofia is running the Advertising Online, muscling you, a shakedown for a payment to be heard, and if it only suits their political agenda to top off. We have two companies, with no disrespect, but it’s an oligopoly, essentially, Microsoft Ads Bing and Google Ads.  This is as close to anti-trust as possible, and although I think Google AdWords has an amazing platform, and in favor of both parties, because my mantra is all perspectives are valid, this is Ironic, in this case, it’s Microsoft who might have a case against Google in an Anti-trust suit, and I like them both.  Guess what, it’s a case for every single advertising agency, a class action law suit, which could even involve SEO Experts paid to help the advertisers.

Thanks goes to @JFGariepy, Sir J.-François Gariépy for sparking the idea.

Social Networks, Ring Fencing Data, and Regional Data Centers

I worked on a project where if there was communication between two parties within the same country not intended for ‘out of country’ consumption, that data needed to be housed in local DCs (Data Centers) for regulatory purposes. It occurs to me that many social networks have centralized data centers. What if on Twitter two people within the same country DM each other, direct message, regarding confidential financial information and that data is routed cross boarders and stored in a central location, say, in the U.S., would that social network be out of compliance with local statues regardless of if the user agreed to the social networks terms. Couldn’t the social networks at least be charged with aiding these potential criminals of avoiding their local country laws? I think this was bought up before but it reoccurred to me with a tweet I saw, Googles floating data center and virtual data center in North Carolina.

Smart Solutions

Skip to toolbar