Global Companies

Facebook Twitter
Global Network Initiative All over the world – from the Americas to Europe to the Middle East to Africa and Asia – companies in the Information & Communications Technology (ICT) sector face increasing government pressure to comply with domestic laws and policies in ways that may conflict with the internationally recognized human rights of freedom of expression and privacy. In response, a multi-stakeholder group of companies, civil society organizations (including human rights and press freedom groups), investors and academics spent two years negotiating and creating a collaborative approach to protect and advance freedom of expression and privacy in the ICT sector, and have formed an Initiative to take this work forward. Global Network Initiative
The Global Network Initiative (GNI) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition of multinational corporations, non-profit organizations, and universities. History[edit] On October 29, 2008, the Global Network Initiative (GNI) was founded upon its "Principles of Freedom of Expression and Privacy".[this quote needs a citation] The Initiative was launched in the 60th anniversary year of the Universal Declaration of Human Rights (UDHR), and is based on internationally recognized laws and standards for human rights on freedom of expression and privacy set out in the UDHR, the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights (ICESCR).[1] Profile[edit] Global Network Initiative Global Network Initiative

'Minority Report' digital billboard 'watches consumers shop' - T
NEC Global
Persoonsgegevens zijn de olie van de 21ste eeuw. De privacyfuiken van marketeers worden geraffineerder, de roep om bescherming zwelt aan. Persoonsgegevens zijn de olie van de 21ste eeuw. Naarmate de privacyfuiken van marketeers efficiënter en geraffineerder worden, zwelt de roep om bescherming van de argeloze consument aan. B R I G H T | vol van vernieuwing B R I G H T | vol van vernieuwing
A business model describes the rationale of how an organization creates, delivers, and captures value[1] (economic, social, cultural, or other forms of value). The process of business model construction is part of business strategy. In theory and practice, the term business model is used for a broad range of informal and formal descriptions to represent core aspects of a business, including purpose, target customers, offerings, strategies, infrastructure, organizational structures, trading practices, and operational processes and policies. The literature has provided very diverse interpretations and definitions of a business model. Business model Business model
The Untold Story of the Search Business Model Ali Partovi is an angel investor, startup advisor, and serial entrepreneur. He co-founded iLike, acquired by Myspace in 2009, and previously LinkExchange, acquired by Microsoft for $265mm in 1998. His portfolio has included such successes as Zappos, Tellme, Ironport, and Facebook. The Untold Story of the Search Business Model
Scott Banister Scott Banister Scott is an American entrepreneur and angel investor. He is best known as a co-founder of IronPort and an early advisor and board member at PayPal. Scott Banister started his career as a pioneer in the email business. He was Founder and VP of Technology at ListBot, the largest ASP for business email list hosting. ListBot was acquired by Microsoft.
Cyan Banister ✔ (cyantist) on Twitter
Your mobile app is spying on you The odds are pretty good that if you’re a big consumer of mobile apps, the private information on your phone has been collected and sent somewhere without your knowledge. That’s the finding of the App Genome Project mammoth study by Lookout, a mobile security company that has scrutinized more than 300,000 apps on both the iPhone and Android mobile phone platforms. San Francisco-based Lookout provides security such as anti-malware for mobile phones. It decided to decipher exactly what mobile apps do when they run, and it found that apps are tapping into personal data and accessing other phone resources without telling users. The company is unveiling the survey at the Black Hat security conference this week in Las Vegas (where I will do live reporting). Your mobile app is spying on you
App Genome Project | The Official Lookout Blog App Genome Project | The Official Lookout Blog July 27, 2010 Click to enlarge infographic The App Genome Project This week at the Black Hat Security Conference, Lookout will unveil the App Genome Project, which is the largest mobile application dataset ever created. In an ongoing effort to map and study mobile applications, the App Genome Project was created to identify security threats in the wild and provide insight into how applications are accessing personal data, as well as other phone resources. Lookout founders John Hering and Kevin Mahaffey initiated the App Genome project to understand what mobile applications are doing and use that information to more quickly identify potential security threats.
ShareThis Starts Measuring Social Reach, Facebook And Twitter Account For Nearly Half ShareThis Starts Measuring Social Reach, Facebook And Twitter Account For Nearly Half When it comes to measuring how content is shared across the Web, the approaches we use today are still pretty primitive. People count how many times a link is shared on Facebook or retweeted on Twitter, but nobody really knows what percentage of those links are clicked on to drive traffic back to the original sites. ShareThis, which offers an all-in-one share button across tens of thousands of sites, is trying to address this issue with new metrics across its network that measure not only how many times a link is shared, but also how many times people act on that and click back to the article or Webpage. It calls this new metric Social Reach. The company shared some data with me about the biggest sharing services across its network, which reaches 400 million people a month.
Introspectr Searches Your Social Streams We are inundated with so many social streams that it is easy to forget where exactly we read something. For instance, there was a story earlier today on Twitter showing better clickthrough rates than Facebook. I know I saw it somewhere, but was it Twitter, Facebook, or in an email? Introspectr Searches Your Social Streams
Sign up for our beta! Enter your email to start finding. Security is our top priority We use industry-standard 256-bit encryption and take privacy and security just as seriously as you do. Stop searching, start finding. Search your cloud | Introspectr
By Stewart Mitchell Posted on 10 Jan 2011 at 14:01 A lawyer has played down the significance of the Twitter data mining sparked by the US's clampdown on WikiLeaks, saying that anyone using sites hosted in the United States had to accept that their data could be made available to authorities. The US security forces have come under fire after it emerged that officials had subpoenaed Twitter demanding it released information from five accounts in connection with its WikiLeaks probe - including the account details of an Icelandic MP and a Dutch computer programmer. The move has sparked outrage among civil liberty campaigners, and the Icelandic government has called for an explanation of the situation, but the basic concept of sovereign states accessing data hosted on their territory is well documented. nsumers "have to accept US snooping" on web services | Security
App Markets






About my6sense My6sense has been a pioneer in native mobile content personalization and discovery since its inception in 2009. Before shifting its focus to the publishing market, the company built a track record developing business-to-consumer products. The my6sense team brings expertise in individual behavior modeling and implicit search capabilities along with a deep understanding of user experience on mobile. This allows my6sense to better target advertising based upon prediction of user intent, which we like to call "digital intuition". The my6sense content discovery bar uses patent-pending technology to help publishers optimize and monetize their mobile e-publishing properties.


Tor: anonymity online

Family & Friends People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet. Businesses Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability. Activists
torproject (torproject) on Twitter Language: English Bahasa Indonesia Bahasa Melayu Dansk Deutsch
Google and Tor Project
“ has recently accessed your account” | Mireille Raad