Thinking Aloud in 2012

By Nathan Gilliatt on January 22, 2013 7:12 PM

Around the end of the year—or the beginning—I look at the numbers to see which blog posts people have looked at the most, and it's always the old posts that dominate the list. It's the same for 2012: only one of the top 10 posts in 2012 was something I wrote in 2012. Since the stats favor the old posts, here's a recap of some of the stuff I'd hope you didn't miss.

  • Three Buckets of Social Media Data
    I've tried categorizing social media before, but this one is turning out to be more helpful than my previous attempts. When working around monitoring and analysis, think of social media as three types of data sources: about content, activity, and people. If you haven't considered all three, you have more work to do.

  • Why Government Monitoring Is Creepy
    The meaningful distinction between private and public spaces is changing faster than our sense of privacy, both online and in the real world. The rise in drone activity around the world will make this an increasingly important topic.

  • What Happens After Your System Notices Something Important?
    No matter how much intelligence we try to engineer into our analytics systems, most are still working toward putting data in front of a person. What if the system helped with the next steps?

  • Can You Trust Social Media Sources?
    Finding meaningful insights in social media data is challenging enough, but there's more. Some of the sources you're finding may have been put there by people who intend to deceive you.

  • The Four Locations of Social Media
    Putting social media data on a map is helpful, but remember that location might not mean what you want it to mean.

Previous years' lists
2011: Top 10 Posts, Revisiting 2011
2010: Top 10 posts, Thinking through 2010
2009: Top 10 posts

The Most-Read Posts of 2012

By Nathan Gilliatt on December 31, 2012 11:34 AM

As the year winds down, it's time to see what people found on the blog this year, and once again, the most-read posts are generally older ones. Clearly, search-engine traffic favors older posts, and the visits add up through the year. But look at it this way: these are the posts on topics people searched for this year. Does that say something useful?

  1. What Does Salesforce-Radian6 Deal Mean for Everyone Else? - March 2011 (#3 in 2011)
  2. Applying Social Network Analysis to Social Media - September 2010
  3. Human vs. machine analysis - April 2007 (#5 in 2011)
  4. Visual text analysis - April 2007 (#6 in 2011)
  5. Visualizing networks based on communication - February 2008
  6. Global Social Media Usage Patterns - January 2011 (#4 in 2011)
  7. Professional-Strength Social Media Aggregators - June 2010 (#8 in 2011)
  8. Monitoring Social Media Before You Have a Budget - May 2008 (#2 in 2011)
  9. Why You Can't Measure Influence - January 2012
  10. Five Modes of Listening - September 2009
In keeping with tradition, I'll highlight some of this year's new posts that I think should get more attention in a separate recap.

Previous years' lists
2011: Top 10 Posts, Revisiting 2011
2010: Top 10 posts, Thinking through 2010
2009: Top 10 posts

2012 Acquisitions in Social Media Analysis

By Nathan Gilliatt on December 17, 2012 2:22 PM

I've been tracking acquisitions in social media analysis for years. It feels like we've had a lot of deals this year, and based on what I've seen, it's true. The volume has gone up every year. This year, I thought I'd do something new: I wrote a recap of the activity, which you can find at The Year in M&A, Social Media Analysis 2012.

spacer

As with the big directory of over 400 companies, the list of transactions requires some judgment about which deals to include. The companies that offer turnkey platforms for monitoring social media are easy. Others offer some of the building blocks for developers who want to focus on other pieces or enterprises building their own tools. Most run on a software-as-a-service (SaaS) model, though some licenses software for on-site installation. The variation gives the market a fuzzy edge, so it's not obvious what to include.

For SMA, I've chosen to go with a coarse filter, which means that I tend to err on the side of inclusion. If I sometimes reach too far, its because I think there's value in knowing what's happening on the other side of the fence.

Looking back
2012 was about more than acquisitions, of course. The investment deal flow continues, which I plan to recap separately, and I'm still discovering new—and new-to-me—companies fairly regularly. At the other end of the lifecycle, I've noticed an increase in companies shutting down quietly and a few sales of "assets" (as opposed to operating companies).

In 2006, I thought I'd find every company in the world developing tools to work with social media data. By now, I think we've established that it's not possible, but it remains an interesting space to watch.

Update: the 2012 investment recap is now up.

Finding a Social Media Analysis Tool With Specific Capabilities

By Nathan Gilliatt on December 7, 2012 11:52 AM

spacer Quick, name a social media monitoring tool that can monitor Instagram. Got one yet? Not sure? I found four in seconds. Here's how.

I launched Social Media Analysis in 2009 to move industry news coverage from my personal blog to its own site. A little over a year ago, I added a free directory of social media analysis companies, which continues to grow as I discover more companies in the market. In yesterday's webinar on choosing social media monitoring tools, I realized that the news archive is the better tool for finding specific product capabilities.

SMA's directory has its own search feature, which knows a few tricks, such as finding companies based on a search for their old names. But if you're searching for a feature, the directory is only as good as the descriptions that the vendors have written about themselves (in this challenge, a directory search found one result). For something as specific as covering a particular network, it's not likely to be a big help.

If you write long enough, you build a history
The good news is that the main site also has a search feature and nearly four years' archive of industry news. The weekly roundups of product updates are particularly rich in keywords for the search engine to use. A quick search for "Instagram" revealed four monitoring tools that have announced Instagram coverage.

Even industry observers who make a point of keeping up with the tools market can't remember every detail of what 400+ companies are doing. Is SMA on your go-to list of resources for keeping up with the social media tools market?

Vendors, have you checked your company's entry recently? Is it complete and up to date? Does it contain the right keywords for searchers?

What Happens After Your System Notices Something Important?

By Nathan Gilliatt on October 25, 2012 4:50 PM

I sometimes summarize the opportunity of social media analysis as using computers to "read the Internet." It's not an original idea, but it is one we still haven't mastered. I've seen many tools that find relevant content and apply some level of automated analysis, but we're not about to replace the analyst. One simple question I've started to think about is, "then what happens?"

The SocialSpook 9000 reads millions of blog posts, Facebook updates, and tweets every second. It finds every relevant mention in your space, extracting the facts, opinions, and needs that you're looking for. Its sentiment analysis engine provides 120% accuracy in 38 languages, and its graphics are so well designed that whole new awards contests have been created for it to win.

In 2007, I pointed out the need to link social media monitoring to customer service, because most of the problems that people were seeing as PR problems started with unhappy customers. Since 2010, I've been thinking about another application: blending social media data with other publicly available sources to create an automated view of what's happening in the world. It turns out to be a big challenge.

My own private news channel… or command center?
We can take this in several directions. At the low end, applications such as Flipboard generate personalized media based on activity in the user's social media accounts and selected topics or sources. In the middle, we might have a more dynamic version of the social media dashboard running in the conference room or reception area. It's the web-powered news channel that always shows something you might care about.

At the high end, we're looking at a valuable—but noisy and sometimes misleading—source of crowdsourced information about events in near-real time. The obvious applications are in government: national security, law enforcement, emergency management, and disaster response agencies are looking for fast and accurate information from social media sources. I see value in corporate applications, too, for functions like security, risk management, logistics, and business continuity that need information when things happen. Preferably without hiring an army of analysts to look at dashboards on the quiet days.

Now what happens?
The challenge in using social media for real-time awareness is that the volume level becomes overwhelming just when the information becomes most valuable. Forget looking for the needle in a haystack; this is the needle in the needlestack. Faster than you can read them, more messages arrive, and they're all relevant.

Existing tools generally emphasize either handling messages individually (think customer service or community engagement) or analyzing them in aggregate (think sentiment and leading topics). For this application, we want the system to help analysts deal with the volume without losing the detail, and that's where I started asking about what happens next.

For all the systems that can notice something happening and put it on a screen, I wanted a system that can notice and pay attention. So what would that look like?

Here's an idea (click to enlarge):

spacer

The inputs to this system can go beyond social media content; depending on your application, it might pick up data about natural disasters, weather, or market data. It might incorporate traditional news media, commercial intelligence services, or internal data. Its models will reflect the needs of its users, so a system that looks for, say, transportation-related incidents could be quite different from one looking for damage reports in weather emergencies.

This has a lot of moving parts, and it builds on what others have already built. The central idea is to go beyond the dashboard and think about how the system can relieve analysts of some of the burden of reading the alert queue. Step one is to consider what an analyst does with that information and how a computer could mimic that.

I'm sharing some of the frameworks that have been hiding on my whiteboard. Want the long version? Email me.

Be Careful with that Email

By Nathan Gilliatt on October 7, 2012 3:09 PM

spacer I'm noticing a big increase in fraudulent emails, and they look more convincing than ever. October is National Cyber Security Awareness Month (via Coretta Jackson), so let's talk about email safety. If you already know this stuff, maybe this is the time to talk to friends and family about it. Parents, this is you, too.

When was the last time you got one of these?

  • The lottery you won without entering
  • The relative of an African dictator or member of the US military who wants your help liberating millions in ill-gotten wealth
  • The stock promoter with a hot tip
  • The fake speeding ticket from New York
  • The warning about your PayPal account
  • The family member who is trapped in a foreign country and needs cash now
Within the last hour? I don't even count how many of these I get every day. But you already know that none of those is what it claims to be.

Fish in a barrel
The most common online scams target the most gullible people. Hey, fraud is a business, and when you're sending out millions of offers, you need to screen your leads well. According to a new study from Microsoft Research (PDF), that explains why so many emails are so obviously fraudulent: they're targeting people who are too gullible to notice the scam.

An email with tales of fabulous amounts of money and West African corruption will strike all but the most gullible as bizarre. It will be recognized and ignored by anyone who has been using the Internet long enough to have seen it several times. It will be figured out by anyone savvy enough to use a search engine and follow up on the auto-complete suggestions… It won’t be pursued by anyone who consults sensible family or fiends, or who reads any of the advice banks and money transfer agencies make available. Those who remain are the scammers ideal targets.

—Cormac Herley, Microsoft Research (emphasis added)

So when you quietly delete that obviously scammy email, you validate the scammer's optimization method. But delete it, anyway.

Going after smarter targets
While the mass-market scammers are going for the easy marks, a different style of criminal is getting more aggressive about smarter targets. They're getting trickier, personalizing attacks on strategically selected targets and masquerading as services you probably use. You won't fall for the secret treasure of Idi Amin, but how about this private message reminder from LinkedIn? The email looks right—or almost right—so you click the link to go to your LinkedIn inbox… and end up installing botnet software on your computer. Ooops.

Your company won't believe it's won the European lottery, so these attackers mimic legitimate business services:

  • The UPS invoice
  • The payroll processing notice
  • The fake complaint notice from the Better Business Bureau
  • The Corporate eFax message
The image at the top of this post is one of two fakes I got on Friday, sent to separate addresses. It presents as approval for some payment system at Intuit, but by now, you know that Intuit had nothing to do with that message.

What does it do, exactly? I don't know, but nothing good. It probably has something to do with stealing a password or installing malware on my computer. We'll never know. <Delete>

Think before you act
Email-borne attacks are serious business. It's not some bored kid messing with your computer; it's hacktivists, criminal organizations, and even governments. As you're going through the daily slog in the inbox, take a few, simple precautions:

  1. If an offer is too good to be true, it's not true.
  2. If a need is unusually urgent, confirm that it's real before you commit resources.
  3. You don't win contests you haven't entered.
  4. Be careful about links in email, even from companies you trust. Look at the URL the link wants to send you to, before you click on it.
  5. Even better, type in the main URL of the trusted site, and use their navigation to find your inbox, or account, or password reset, or whatever you think needs attention.
  6. Be extra alert about attachments, especially ones you haven't requested.
  7. Don't open compressed (.zip) or executable files from unknown sources.
Finally, if there's any doubt about something you get in email, stop and think before you do anything. Type the main keywords and "scam" into Google, and see if the results tell you something important. Look it up on Snopes, which has been investigating rumors and scams for years. Email can wait for a little due diligence, but it's hard to unfall for the trap once you start clicking on things. You have so much investigative power as close as the nearest web browser, why not use it?

You're good with all this? Haven't been tricked in a long time? Excellent. Go share your wisdom with someone this month. Keep your family and friends from becoming victims.

Whole Lotta Influence Going On

By Nathan Gilliatt on October 5, 2012 2:28 PM

What do you do when you disagree with a conference speaker? Do you tune out, start checking email, check the schedule for when the next session starts? Do you post snarky comments to Twitter and Facebook? Do you challenge the speaker in the Q&A time? What if the topic is well worn, and you're getting tired of hearing the same points you disagree with? Are you tired of the influence arguments yet?

While sitting through a presentation for nonprofits on communicating with online influencers, Heidi Massey got that familiar feeling, so she challenged the speaker, Justin Ware, in the Q&A. They continued the discussion after the session, and it's led to a great pair of point/counterpoint posts on using Klout scores:

  • Heidi: Klout: Not Even A Good Starting Point

  • Justin: Klout: It Does Matter and Here’s Why
I like this. Not only do they go to the effort of thinking through their arguments and writing something coherent, they do a service to everyone else by linking to each other's posts. It's a nice idea: post your position, and link with someone with a different opinion. Do you think it will catch on?

Speaking of influence, was there a memo about putting influence startups in Portland? First Tellagence, now Little Bird? If you need to identify the right people for spreading your message, the available tools are multiplying fast.

There should be a rule that if you have an argument on a Friday, you have to cite Monty Python.

The Summer Reading Post

By Nathan Gilliatt on October 4, 2012 2:00 PM

It seems that I'm late posting this year's "what I read this summer" post. That's to be expected, since I'm behind on the reading pile, too. But summer is giving us an encore this week, so here's my chance to share some of the interesting things I've read with you.

spacer Attack of the killer drones
I read mostly nonfiction these days, but I did take a summer diversion with two books by Daniel Suarez, who's making a run for the techno-thriller trophy. The first was Freedom™, which is more part two than sequel to Daemon (recommended in the 2010 list). If you liked Daemon and haven't read Freedom™ yet, you need to find out how the story ends.

Suarez's new book, Kill Decision, takes the same approach of combining current technology with a dose of near-future science fiction, but this time the threat is from autonomous swarms of killer drones. This one's weaker as a novel, but it raises serious issues: Black-hat PR in social media. The use, abuse, and proliferation of armed UAVs, persistent surveillance, and open-source intelligence. The attribution challenge of cyber warfare. By pushing these themes (and others) to an extreme, Suarez creates an opening to think about where the limits are, and where they should be.

If the dawn of the drone age interests you, you can balance the fictional portrayal with Wired for War, P.W. Singer's 2009 book on UAVs and ground-bound robot warriors. You'll wonder what war even is, when one side is far enough from the action to avoid harm. From there, pick up Rachel Maddow's Drift (2012), which—despite the author's well-known leanings—is a generally conservative take on the vanishing checks (in the U.S.) on executive power to make war.

What I like about Suarez is that his novels tie into real-world issues in a way that gets you thinking. These other books prove that the topics Suarez raises are real, even if the specifics include some science fiction.

spacer Random difficulty
How improbable is an enjoyable read in statistics and probability? Leonard Mlodinow's The Drunkard's Walk: How Randomness Rules Our Lives (2008) demonstrates how much of what we interpret as cause and effect may be the result of the expected variation in random processes. Baseball stars and hedge-fund winners look a lot like coin tosses, if you look forward into the future instead of backwards into the hindsight.

The Drunkard's Walk gives the best explanation of Bayesian reasoning I've yet encountered, even while using the cancer-screening example that must be required. You also get a chapter on the Monty Hall problem, which is a bit of a mind-bender even after the light comes on. We're really not used to problems that break the rules of the discipline.

Nassim Nicholas Taleb's first book, Fooled by Randomness (2001), covers much of the same territory—people misinterpret randomness habitually—but it returns too often to the financial markets for its lessons and examples. Taleb's forthcoming Antifragile, on the other hand, looks like a must-read this fall. Systems that actually benefit from chaos and black swans? Time for some solid-surface counterintuitive.

spacer How's that prediction working out?
Flipping the empirical method around, Duncan Watts tears into our habit of backfitting our analysis to fit past events and calling it common sense in Everything is Obvious (Once You Know the Answer) (2011). In so many different ways, the world is too complex to predict—oh, and randomness is a problem that we don't handle well.

The answer is to respect the unknown, build flexibility into our plans, and get better at reacting quickly instead of trying to predict the future. These are themes I keep running into, and they make a lot of sense. Or is that just my confirmation bias speaking?

The queue is winning
I started Rohit Bhargava's Likeonomics: The Unexpected Truth Behind Earning Trust, Influencing Behavior, and Inspiring Action (2012) this summer, and while I got surprisingly useful ideas from the first couple of chapters, events got in the way. I'll get back to you when I finish that one.

This post has become a bit of a tradition. If you like this, you might enjoy these posts from previous years, too: 2011, 2010

Social Media Monitoring: Bespoke, Tailored, or Off the Rack?

By Nathan Gilliatt on September 26, 2012 3:23 PM

spacer So much of the public discussion of social media monitoring and analysis focus on commercially available platforms that are more or less ready to go to work. Somebody has to set up the queries, and there may be some dashboard configuration, but the tools are generally pay-and-go propositions. A recent article points out that some companies are going for something much more customized to their needs.

In its big list issue on companies doing IT well, Information Week mentioned Toyota's new social media and CRM tool:

The tool took 60 hours to develop, largely using software Toyota already had. Oracle Endeca Discovery handles data discovery and search analytics, WiseWindow and DataSift aggregate social data, and Lexalytics analyzes sentiment.

Toyota is using the tool to improve customer service, product forecasting and quality, and lead generation. It plans to feed information to dealers in the future.

If the usual model is off the rack—software-as-a-service from a single vendor, up and running with minimal configuration in minutes, hours, or days—this is custom tailored software, using the available APIs to combine the strengths of multiple products and vendors. With so many companies offering the building blocks of social media analysis, a mind-boggling near-infinity of combinations could be assembled to do—well, what would you want to do?

The opposite of off the rack is bespoke, which in this context means completely custom software development. Even using some of the open-source components that everyone uses as important building blocks, it's a lot of work. Unless you're in the software business (or might enter it), I'm not sure why you would bother. It's hard to think of even narrowly specialized applications for social media analysis that don't have someone trying to address the market.

Custom is expensive, which is why the volume market goes for off-the-shelf products. But given a hint of what one company is doing to tailor a system to fit their needs, I want to know more. Do you know other examples that people can talk about?

Photo by Douglas LeMoine.

Using Live Data as Eye Candy

By Nathan Gilliatt on August 24, 2012 4:11 PM

At some point, every user of data fantasizes about an over-the-top command center (it's not just me, right?). The emergence of the social media command center concept is creating an excuse to indulge that desire for a NORAD/NASA/DOT mission control, replete with a constellation of flat screens and constantly updating charts. If you're thinking of jumping in, you'll want to read Jeremiah's lengthy post on the topic. But what if your needs—and budget—are more modest? What if you're looking for one very nice overview for a public place?

If you go out into the world as a customer, it's hard to avoid televisions in public places. The trendy business equivalent is the live dashboard that shows how things are going, from web traffic to sales to the stock price to online chatter. We're past the days of a single-column TweetDeck in a conference session; these offer tweets, pictures, metrics and more. If you want a live picture for the reception desk, team area, conference room, or trade show booth, it's now easy to put together something worth looking at.

Here are a few I find interesting:

  • spacer Liveboard (Twingly)

    Liveboard is all about the tweets, combining live-updating metics with sample tweets. The top-level metrics (total tweets, unique users, retweets, etc.) are animated with an analog odometer effect that serve as a sort of pulse for the display. Its charts list the top tweeters and hashtags associated with the topic, and visualizations depict volume by day and hour.

    See the live demo, and be sure to click on the screen and move it around; there's another visual off the right side of the screen (or make it fit your screen by reducing the height of the window).

  • spacer Multitude (JamiQ)

    Multitude is a moving timeline of a Twitter search, illustrated with the images people attach to their tweets. JamiQ describes it as a wall, which would be a good use for it. The design is simple, clean, and not interactive, so it makes a reasonable backdrop or lobby display. The updates can move quickly, so it benefits from being shown on a wide screen.

    See the live demo.

  • spacer Tickr

    Tickr combines the summary on the wall with the combined-source analytics dashboard, creating a live-updating view that can be tailored to different purposes. Load it up with sources of performance data—business, operations, or technical—and it's a constant reminder of how things are going. Point it at social media sources, and it's another candidate for the trade show display.

    The company's "try it" page includes links to multiple live examples using social media data. The site also has case studies that show the use of other data sources.

Buy, adapt, or build your own?
The wall-mounted dashboard plays a different role than the analyst's interactive view. Once configured, it's meant to run without user interaction, and a clean, no-controls interface design makes it look more like TV than computer software. As always, it pays to start with some thought to what you want to accomplish with the display (beyond scratching that desire to show off your data). Even eye candy should have a purpose.

Realistically, many dashboards might be configured for this kind of use. If you can configure the widgets on the screen, and if they update without user action, you have the raw ingredients for this kind of application. If you're using a social media analysis platform, you might be able to set up a live view of people talking about your company or event. The newer dashboards that combine social media data with other sources could be set up for this. Leftronic, for example, seems to specialize in big-screen, non-interactive display applications.

Is this something you're doing? Have you seen an unusual use of this type of display? Where do you want to see live data?

And, as always, who have I missed?

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.