Are LinkedIn’s “Top Influencers” really just “Top Provocateurs”?

LinkedIn Logo

What does it mean to be a person who is influential?  I think most people say it’s about the ability to be persuasive.  And that’s a tough quality to measure.  But my many friends in the media try it all the time.  Influence is often assumed to directly correlated to the size of an audience someone has – if a large number of people pay attention to what a person says – voluntarily or involuntarily – that person is said to be influential.   A magazine is thought to be influential based on the number of readers it has.  The same is true with books, movies, etc.

LinkedIn has a measure they call “Top Influencers This Week”, it’s a box that displays the names and pictures of the individuals LinkedIn has determined are the most influential among LinkedIn users.  I ‘ve been noticing this feature lately because of an online discussion I’ve been monitoring within the Mensan community at LinkedIn.  The discussion is on the topic of the U.S. Constitution, citizen’s rights, gun control laws, and the aftermath of the tragic Sandy Hook Elementary school shooting in Newtown, CT.  I made the mistake of posting a comment or two at the beginning of the thread, which I generally don’t do, I try to stay out of political discussions at a professionally-oriented site like LinkedIn.  But there were a few fundamental misrepresentations of U.S. law that I figured might be a typo but were important to address, so I did.  Big mistake.  My email inbox has been flooded since with every comment since then, and even though I’ve gone back and deleted my original comments to try to get it to stop, they continue – I just received another two dozen comments in my inbox this morning.  Maybe there’s a “follow this discussion” box I can uncheck somewhere, but I haven’t looked yet.  But I digress.

Watching this discussion is making me aware of the LinkedIn “Top Influencer” feature.  The person who originated the discussion thread is currently listed as the number two “Top Influencer This Week” at LinkedIn, if I’m reading this correctly.  Another person in the discussion thread, who I believe has originated other discussions elsewhere on the site, is listed as the fifth most influential as I write this.

Here’s the problem: those two individuals are clearly in the minority of the discussion.  They aren’t influencing anyone, they are provoking most of the responses, and most comments are at odds with the two “top influencers”.  The reason LinkedIn charts them as “Top Influencer” is merely because they started a thread that got a lot of people involved.  But the majority of those people who are involved are arguing against the positions of the two “Top Influencers”.

So are these folks really “influencers”?  Perhaps LinkedIn should rename that feature “Top Provocateurs”, because that’s really all that is happening there.

So beware:  just because you’re told someone or something is at the “top” of any chart, be sure you know what the metrics are based on.

I hope I’ve managed to influence your thinking on this important aspect of data analysis.

 

DHS Warning About Java: Update

Several days ago I wrote a blog post about the warning from the U.S. Department of Homeland Security (DHS) about the use of Java.  DHS had gone so far as to advise users to disable Java in their browsers.

A few words of clarification:  as many of you surely know, Java is not JavaScript.  Those are totally different and unrelated languages, in spite of the unfortunately similar wording.

Second, by warning users to turn of Java in their browsers, DHS is essentially telling them to disable Java applets, which are the only form of Java programs that can run in a browser.  Applets are small programs that exist on websites, and that download to your browser, and execute on your own local computer, all within a container that is intended to prevent it from doing anything to your computer without your express permission.  Generally the only thing an applet is allowed to do is present data visually and accept typed or other forms of input from the end-user.  Frankly, that’s not how most Java-based systems work today.  Most Java-based systems consist of Java programs that run elsewhere – within mobile devices, or on servers in all sorts of forms.  Lots of websites use Java on the server side and never send applets to their end-users browsers.  So you may still be visiting a website that runs Java on the server side, and that never sends executable code to your browser, it probably only serves up completed web pages, and that’s fine, you’ll be safe insofar as the DHS warning is concerned.

So now it’s February 3, 2013 (Super Bowl Sunday incidentally), and yet – still no apparent conclusion to the Java situation.

Technology News Logo

The most recent article I can find right now is Taking the Java Bull by the Horns by Patrick Nelson at Technology News, published Jan. 31, 2013, and it says this:

even though Oracle has made some efforts to patch the flaws, DHS hasn’t lifted its warning … As of Jan. 22, 2013, the current version of Java is Version 7, Update 11. The latest version includes fixes for issues raised by DHS as well as other issues. It also sets security settings to “High.” … You may decide that it’s prudent to switch off Java altogether. New Java vulnerabilities are likely to be discovered, according to DHS’s Computer Emergency Readiness Team.

The article also includes step-by-step instructions for performing upgrades and adjusting security settings in your browser.

We’ll keep an eye on this.  I think many of us are so busy working in non-applet areas that we’re not all that concerned.  However, I know firsthand of one company that internally uses an applet-drive software tool for internal corporate communications, and they’ve recently made the call to shut it down until this issue is resolved.  It’s disruptive for sure.

Stay tuned.

DHS Warns About Java; Red October Connection?

A few days ago, the U.S. Department of Homeland Security issued a warning to temporarily disable Java on your computers, warning of:

A vulnerability in the way Java 7 restricts the permissions of Java applets could allow an attacker to execute arbitrary commands on a vulnerable system.

Now this morning we have this from ARS Technica: Red October relied on Java exploit to infect PCs

Attackers behind a massive espionage malware campaign that went undetected for five years relied in part on a vulnerability in the widely deployed Java software framework to ensnare their victims, a security researcher said.

And:

Oracle developers patched the bug in October, 2011, the malicious Java archive file was compiled the following February.

Be warned.

The Skin Gun

And now for something completely different.

As you probably know, I generally use this blog to talk about entertaining and fun and unusually talented people, many of whom are friends of mine, and some of which you may not know about.  I generally stick to anything involving the creative arts, but am open to anything that’s interesting and perhaps a bit unusual.

This is one of those posts, and it’s not just fascinating, it represents a significant medical breakthrough.  And it’s a bit serious, so brace yourself for the subject matter.

Below is a video on YouTube that is a snippet of a National Geographic piece about something new they’re calling the “Skin Gun”.  The idea is that if someone is a burn victim and has lost a relatively large area of skin, this spray gun, which is sort of like a spray paint device, can be used to apply a solution to the burned area and allow the patient to heal quickly.

And “quickly” is an understatement.  In the video, you’ll see the first patient on which the device was used – Matthew Uram, described in the video as a Pennsylvania state police officer.   After experiencing second-degree burns, his doctor asked him if he was interested in trying this device, and he did.  It took 90 minutes to prepare the solution and apply it.  “They did it on a Friday, my follow-up was that Monday and … it was healed.”

Amazing.

Note:  I generally embed videos into my blog posts, but the video below is not embedded.  It looks like it is, but when you click on it, you’ll see how it reacts and you’ll be able to tell that it’s not embedded, it’s actually a link to the YouTube site, so you’ll see it over on the YouTube site.  The reason I set it up in this unusual way is simple:  if I embed a YouTube video, the video automatically incorporates the “splash” screen chosen by the YouTube user who uploaded the video.  For this video, the user apparently chose a somewhat shocking “splash” image from the video of a burn victim.  It makes sense over at YouTube, he was clearly trying to get attention and convey that it’s a burn victim video.  And you’ll see that image in the video below.  It’s not completely revolting – I’m sure you’ve seen worse – but it’s a bit shocking in the context of Skere9, which is a fun and entertaining site.  I wanted a chance to say “brace yourself” first.  So consider yourself warned!

The video is below, and highly fascinating.

 

The Skin Gun

Security Inside The Perimeter

A key in a keyboard lock

One of the issues that was being discussed at this past Oracle Open World 2012 was the importance of considering security during the design stage of a system development effort.  Technology journalist Michael Lee wrote about this issue last fall in a piece titled Developers ignore their security responsibilities: Oracle.  In it, Lee addressed the observations of Oracle Chief Security Officer Mary Ann Davidson:

Marines don’t consider perimeters to be completely unbreachable, and hence, need to be prepared to defend themselves from attack from the inside … Davidson said that many organisations still assumed that attackers won’t get inside their perimeter … [1]

Davidson is totally right, but it is starting to change.  An increasing number of the customers I work with are starting to operate on the assumption that security perimeters will be breached.  Security measures are no longer limited to protection at the perimeter.

This is one place where analytics can play a role.  I’m not just talking about security information and event management (SIEM).  Through data collection and pattern analysis, an alert system can proactively monitor for aberrations in the data flows and process flows within a system, and can help identify probabilities of a possible intrusion and take actions accordingly. But the point is that most security starts with a healthy dose of common sense, applied at all levels of a system’s operational capabilities.

I live in the suburbs of Washington, DC, but recently attended an NFL football game in Philadelphia, and afterwards was having dinner in downtown Philly, when I received a call on my mobile phone from Visa.  They said it was a courtesy call regarding my credit card, and offered some proof of who they were and how they knew my account, and then asked a few questions to confirm who I was.  The exchange was professional and left me confident of the authenticity of the call.  They then asked if they could review a few recent purchase requests on my credit card, and I said – sure.  Sitting there in the restaurant, I listened as they asked me if I had authorized a purchase of gasoline in Pennsylvania that morning?  I said well yes, as a matter of fact, and feeling comfortable that they were who they said they were, I offered that I was heading to the Redskins-Eagles game that day, and was intending to use the same card to pay for the dinner I was eating as they were speaking to me.

They then asked if I’d attempted to purchase a washing machine at a Target department store in Washington, DC on that same afternoon.

I said – uh – no.  I was sitting in the Eagles stadium in Philadelphia about that time.

What about a refrigerator at a second location, also in DC?

Definitely not.

They then said well, you probably didn’t authorize these additional six or seven attempts to purchase large appliances at five different department stores in Washington, DC this afternoon, if you’re in Philly at a football game.  I said – no, not at all.

Thank you, they said, we rejected all of those attempts and just wanted to confirm we did the right thing.  And should you use the card to purchase your dinner tonight, it will be approved with no problem.  But we’re going to cancel this number and issue a new credit card to you, you’ll not be charged.

I said – thank you.

I enjoyed the rest of dinner, paid for it with no trouble, and two days later I had my new credit card with the new number.  I was never charged anything inaccurate or fraudulent.  It all worked out remarkably well.

To help put the incident in perspective, I had the correct physical credit card with me at all times, and the would-be scammer did not, but whoever it was had my credit card number, and he or she was attempting to use the number alone – without the card – to make these purchases.  Visa rejected them all, and according to what they told me, it was in large part due to the fact that the purchases conflicted with my patterns.  Also, this all happened right before Visa began issuing cards with an additional numeric code printed on the back of the card.  That started immediately after these events, so it didn’t apply to these circumstances.

At the end of the day, security is not only about the latest technological breakthrough.  It’s about a combination of two things:

  • A sound understanding of the how the fundamentals of technology operate
  • A common sense approach to defense against classic con games

Any system developer must keep these concepts in mind, and recognize them in securing perimeters, and in developing a solid plan of defense for those times when perimeters are broken.  Perimeters will be broken.  The only question is:  how will you respond?

Footnotes

[1] http://www.zdnet.com/developers-ignore-their-security-responsibilities-oracle-7000005808/

Social Media Rock Stars Jon Ealy and Jeremiah Anthony

In October 2011, two students at Iowa City’s West High decided to use social networking to complimenet and encourage fellow students, as something of a counter to the practice of cyber-bullying that’s been reported in various news articles lately. The students are named Jon Ealy and Jeremiah Anthony. The practice has attracted a good amount of notice, particularly from Skere9.  There’s a photo at Pinterest of Jon and Jeremiah working together on the sites.  Their sites include a Twitter account named @WestHighBros.

And here’s a video – that only mentions Jeremiah for some reason, but – see below.