Feeds

Wavii aims to transform news delivery with social data

Machine learning used to guess headlines of interest

Combat fraud and increase customer satisfaction

A Seattle-based startup is looking to give computer users a personalized news feed based on their social-networking preferences.

Wavii is the brainchild of Adrian Aoun, an ex-Microserf, who told The Register that his team of around 25 staffers had made a breakthrough in machine understanding of language that enables the personalization of news feeds to be much more effective than previous systems. The Wavii service is initially going to be linking into Facebook feeds for its data, with Twitter and other social-media sources to be added later.

"Everyone tried natural language processing [by computers], but no one's taken our approach – and it works," he says. "There's an advantage to coming after Google, Facebook, and Microsoft on this. We also got their learning in this area and can see what was tried and failed."

Wavii servers scan current and breaking news, as well as other social-media data, to bring up a timeline of what's going on where. It then presents the information, with links to drill down further and tools for the user to express likes and dislikes about the information that is fed through.

wavii screenshot

Users need to fine tune their interest choices

The system does require fine-tuning by the user, so that the Wavii system can learn enough to sort the correct news events to match areas of interest. At the moment the service deals with four news areas: entertainment, technology, business, and politics. Aoun say that the systems set up by Wavii can be either run as a standalone service or licensed to third-parties.

El Reg has been trying Wavii out for the last few days, and the system certainly looks interesting – but it's clear these is very early days. Certainly a lot of the news is entertainment-focused, but some surprising snippets have cropped up, along with a lot of outdated information. Since the system has only been running with less than a thousand testers so far, it's also going to be interesting to see how well it copes with volume traffic. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.