article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. I Want To Mine This raises much larger issues about how – or whether – we are intelligently architecting the possibilities that define our interaction with knowledge. The original MusicPlasma interface.

Mining 52
article thumbnail

How process mining improves IT service management to save your business time and money

IBM Big Data Hub

Communication technology like email and Slack have become so essential that business grinds to a halt if there are gaps in service. Similarly with ticket reopens: if a ticket is reopened after being resolved, it indicates the need to address an issue with training or IT resources.

Mining 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

One of the best ways to take advantage of social media data is to implement text-mining programs that streamline the process. What is text mining? When used strategically, text-mining tools can transform raw data into real business intelligence , giving companies a competitive edge. How does text mining work?

Mining 58
article thumbnail

How to unlock a scientific approach to change management with powerful data insights

IBM Big Data Hub

Grasping these opportunities at IBM, we’re increasingly building our specialism in process mining and data analysis tools and techniques we believe to be true ‘game changers’ when it comes to building cultures of continuous change and innovation. CoE = Center of Excellence = Accelerator for Change. Making it happen: Driving faster adoption.

Mining 52
article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

Here’s the latest: a training-time attack that forces the model to exhibit a point of view: Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.” Persona bots have histories, personalities, and communication styles. They don’t constantly spew propaganda.

Mining 92
article thumbnail

Archivists and Records Managers, part 13

The Schedule

He encouraged information management professionals to consider additional uses of records beyond their typical administrative, fiscal, and legal uses, including: marketing and communications. employee training and education. data mining. strengthening corporate identity. documenting mission and history.

article thumbnail

Catches of the Month: Phishing Scams for September 2023

IT Governance

Malwarebytes reports that, once installed, DarkGate Loader can be used for many nefarious purposes, including “remote access, cryptocurrency mining, keylogging, clipboard stealing, and information stealing”. You can help educate your staff with IT Governance’s Phishing Staff Awareness Training Programme.

Phishing 110