Language Selection

English French German Italian Portuguese Spanish

Software agents give out Advice

Filed under
Software

Governments and big business like to indulge in media spin, and that means knowing what is being said about them. But finding out is becoming ever more difficult, with thousands of news outlets, websites and blogs to monitor.

Now a British company is about to launch a software program that can automatically gauge the tone of any electronic document. It can tell whether a newspaper article is reporting a political party's policy in a positive or negative light, for instance, or whether an online review is praising a product or damning it. Welcome to the automation of PR.

Till now, discovering whether the coverage you are getting is good or bad, negative or neutral has usually meant hiring a "reputation management" firm. Teams of people employed by the company will read through everything written about a chosen organisation, person, event or issue and report back on how favourable it is.

As well as being expensive, this can be a long, slow process, says Nick Jacobi, director of research for the Corpora Software company in Surrey, UK. "There's a massive information overload." A single news agency may churn out more than eight articles each hour. That is almost 200 stories a day per news outlet.

Previous attempts to automate this kind of analysis have used one of two techniques. In the first, called machine learning, a program is trained by being given thousands of articles already determined by a human reader to be positive or negative in tone.
But learning in this way can lead to mistakes. For example, if a series of the training articles mentions bomb attacks on a mosque in Iraq, the program may incorrectly conclude that all other mentions of mosques are negative too.

The alternative is the lexicon approach, in which certain words are classified as either positive or negative. But plenty of words can be both. "The plot was unpredictable" and "the steering was unpredictable" differ by just one word. Yet the word "unpredictable" has a positive connotation in the first example and a negative meaning in the second.

And even if that problem is solved, just picking up on positive or negative words can also lead to mistakes, as is demonstrated by the sentence: "Everyone told me it was terrible, that I would hate it, but in the end it wasn't at all bad".

Full Story.

More in Tux Machines

NVIDIA ups Competition Using Open Source Collaboration

Let’s imagine that you are a company with a very successful if nuanced product. Graphics accelerator chips, for example. Hypothetically speaking, imagine that you find an interesting use for your chip in a rising market defined by a burgeoning technology. If you need an example, just use deep learning AI software. Now, let’s say this proves to be a massive windfall for your company, raising its stock prices tenfold in just three short years. What do you do with this fortunate turn of events? Do you start designing your own AI chips based on your original design and remain one of the top competitors in this new market, or do you go open source and give your chip architecture designs to the public? Read more

Android Leftovers

Ubuntu 17.10 (Artful Aardvark) Is Now Available to Download

While there's no official announcement published at the moment of writing, Canonical released the final ISO images of the Ubuntu 17.10 (Artful Aardvark) operating systems and its derivatives. Read more Also: Ubuntu 17.10 Ships Today - Arguably Its Most Interesting Release In Years

Security: WPA2, RSA/TPM, and Microsoft Breach

  • Google and Apple yet to fix Wi-Fi hole in a billion devices

    The WPA2 security protocol has been a mandatory requirement for all devices using the Wi-Fi protocol since 2006, which translates into billions of laptops, mobiles and routers. The weakness identified by Mathy Vanhoef, a digital security researcher at the Catholic University of Leuven (KUL) in Belgium, lies in the way devices running WPA2 encrypt information.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on. They can lack full documentation even months or years after their release.

  • Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

    Security experts say the bug has been present since 2012 and found specifically in the Infineon’s Trusted Platform Module used on a large number of business-class HP, Lenovo and Fijitsu computers, Google Chromebooks as well as routers and IoT devices.

  • ROCA: RSA encryption key flaw puts 'millions' of devices at risk

    This results in cyber criminals computing the private part of an RSA key and affects chips manufactured from 2012 onwards, which are now commonplace in the industry.

  • Infineon RSA Key Generation Issue

    Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.

  • Microsoft remains tight-lipped about 2013 internal database hack [sic]

    A secretive internal database used by Microsoft to track bugs in its software was compromised by hackers [sic] in 2013.

  • Exclusive: Microsoft responded quietly after detecting secret database hack in 2013

    Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking [sic] group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.