Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Mehdi Daoudi, Yeshim Deniz

Blog Feed Post

Linkedin: We know better

Agility is essential in the modern Business and Information Technology world. Many posts about  Service Oriented Architecture and Business Process Management in this blog are about Agility and Adaptation.

If you think that you know better than others, you probably will not Adapt.

Example 1: A Bank
Few years ago, instead of receiving Web Page with one of my bank account reports, I received an error message.
As the report was consistently displayed correctly, it looks like a bug correction implemented with insufficient Regression Tests.  

I notified the bank about the problem. They ignored my report and tried to find my incapability to use a Web Site (after more than 30 years in IT, including many years of using their Web Site).

After a week or two I identified the circumstances in which the report is not displayed correctly: It happens if and only if, the report should be displayed in more than one Web Page.
I send to the bank my analysis + the error message.

Unfortunately, I was not able to correct the bug without Source Code.
The result: Customers, including myself, had to wait two weeks for correction of a bug I could fix in an hour or two, if I could access the Source Code.  

example 2: Another Bank
I found that a bank performed a transaction in a bank account I managed, without an order to do it. As the activity was an activity no customer would ask a bank to do, I thought that I had to go to talk to the clerk, who performed it. 
Together we found the mistake the bank performed and corrected it. It was a mistake not an intention to steal money from the account.

However, based on my background in Computers Security Systems (Including Penetration Test in another bank), I easily found that someone (probably a bank employee) could use the same mechanism for criminal actions.

I even knew that an American bank programmer was convicted and jailed for stealing customers money using a similar mechanism to the mechanism used innocently in my account. 
The Systems should be changed in order to identify unreasonable Orders and check them  automatically or manually

I wrote to the bank expecting that they will fix the vulnerability and thank me. I thought they probably pay me a little amount of money, which I intended to donate to an organization helping children suffering from cancer. 

The bank thought that they new better: They ignored my message.

Do I post Spam?
I will list my writing experience and you will answer the question.

My writing activity includes:

1. An article based on my Masters Thesis in Psychology, written by me and my thesis moderator. He is a  university Professor. The article was published in Hebrew in a local Scientific Journal.

2. Many articles on various Information Technology topics, which were published in local and European journals and local Web Sites. 

3. Three blogs. The other two are written in Hebrew.

4. I participated in ebizq SOA Forum writing my opinion on questions asked.

5. I wrote about 100 articles in the Hebrew Wikipedia. A month ago I received a price for improving a stub article, during a competition for improving stub articles.  

6. More than hundreds of posts in Facebook, Twitter, Googl+ and Linkedin (including many Linkedin groups).
Some of the posts received Comments, Likes and Shares.
 
Yesterday, I tried to post in Linkedin. I received a message that because someone (or some people)  reported that a post of mine is Spam, the post will not displayed, but will be submitted to The Group Leader, who will check the post and decide to publish it or not to publish it.

What is the Problem?
There are two Linkedin Groups types:

1. Groups whose policy is to moderate posts prior to  publishing.
The group leader is aware of posts he has to moderate. He will probably moderate the posts shortly after they were submitted.
As a member of many Groups of this type, I submitted posts which were published. Nothing was changed due to flagging a post of mine as Spam.

2. Groups whose policy is to publish automatically
The problem is that in those groups the group leader is unaware of Posts waiting moderation. According to Linkedin message it could take weeks until they approve my post and publish it. 

Timing could be a significant factor for Posts Publishing.

Linkedin message send to me, recommended applying to Group Leaders and asking them to remove the restriction, so my posts could be published automatically. 

I am a member of too many Groups of that type. I prefer to write this post instead of applying to all groups leaders. 

It is not a personal problem. Any body's viable posts could be marked as Spam intentionally or unintentionally.

Is Linkedin Spam detection limited?
The answer to this question is Yes
Linkedin should use the approach used by Anti-Spam Software, based on Bayesian algorithms.  

If someone posted many posts and get Likes and Comments do not hurry to restrict him, just because one or few readers marked it as a Spam (intentionally or unintentionally). 

On the other hand, if someone posted only 5 posts and many people marked every post as Spam stop him, by a mechanism similar to the mechanism used to stop me or even more extreme procedure.

It should be a gradual process based on additional information.

My Take
It looks like Linkedin's approach resembles the approach the Banks in example 1 and example 2 adopted.

According to the answer they send to me, when I suggested that they will improve their Spam detection algorithm, they stick to the current approach. 

As anyone can mark any post as Spam, probably they may change their algorithm only after someone will intentionally mark as Spam many posts by leading contributors. 

Read the original blog entry...

More Stories By Avi Rosenthal

Ari has over 30 years of experience in IT across a wide variety of technology platforms, including application development, technology selection, application and infrastructure strategies, system design, middleware and transaction management technologies and security.

Positions held include CTO for one of the largest software houses in Israel as well as the CTO position for one of the largest ministries of the Israeli government.

Microservices Articles
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
All zSystem customers have a significant new business opportunity to extend their reach to new customers and markets with new applications and services, and to improve the experience of existing customers. This can be achieved by exposing existing z assets (which have been developed over time) as APIs for accessing Systems of Record, while leveraging mobile and cloud capabilities with new Systems of Engagement applications. In this session, we will explore business drivers with new Node.js apps ...
Digital Transformation is well underway with many applications already on the cloud utilizing agile and devops methodologies. Unfortunately, application security has been an afterthought and data breaches have become a daily occurrence. Security is not one individual or one's team responsibility. Raphael Reich will introduce you to DevSecOps concepts and outline how to seamlessly interweave security principles across your software development lifecycle and application lifecycle management. With ...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Two apparently distinct movements are in the process of disrupting the world of enterprise application development: DevOps and Low-Code. DevOps is a cultural and organizational shift that empowers enterprise software teams to deliver better software quicker – in particular, hand-coded software. Low-Code platforms, in contrast, provide a technology platform and visual tooling that empower enterprise software teams to deliver better software quicker -- with little or no hand-coding required. ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...