Global Network Initiative
The Global Network Initiative (GNI) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition of multinational corporations, non-profit organizations, and universities. History On October 29, 2008, the Global Network Initiative (GNI) was founded upon its "Principles of Freedom of Expression and Privacy".[this quote needs a citation] The Initiative was launched in the 60th anniversary year of the Universal Declaration of Human Rights (UDHR), and is based on internationally recognized laws and standards for human rights on freedom of expression and privacy set out in the UDHR, the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights (ICESCR). Profile Global Network Initiative
'Minority Report' digital billboard 'watches consumers shop' - T
Persoonsgegevens zijn de olie van de 21ste eeuw. De privacyfuiken van marketeers worden geraffineerder, de roep om bescherming zwelt aan. Persoonsgegevens zijn de olie van de 21ste eeuw. Naarmate de privacyfuiken van marketeers efficiënter en geraffineerder worden, zwelt de roep om bescherming van de argeloze consument aan. B R I G H T | vol van vernieuwing
A business model describes the rationale of how an organization creates, delivers, and captures value (economic, social, cultural, or other forms of value). The process of business model construction is part of business strategy. In theory and practice, the term business model is used for a broad range of informal and formal descriptions to represent core aspects of a business, including purpose, target customers, offerings, strategies, infrastructure, organizational structures, trading practices, and operational processes and policies. The literature has provided very diverse interpretations and definitions of a business model. Business model
Ali Partovi is an angel investor, startup advisor, and serial entrepreneur. He co-founded iLike, acquired by Myspace in 2009, and previously LinkExchange, acquired by Microsoft for $265mm in 1998. His portfolio has included such successes as Zappos, Tellme, Ironport, and Facebook. The Untold Story of the Search Business Model
Scott Banister Scott is an American entrepreneur and angel investor. He is best known as a co-founder of IronPort and an early advisor and board member at PayPal. Scott Banister started his career as a pioneer in the email business. He was Founder and VP of Technology at ListBot, the largest ASP for business email list hosting. ListBot was acquired by Microsoft.
Cyan Banister ✔ (cyantist) on Twitter
Your mobile app is spying on you The odds are pretty good that if you’re a big consumer of mobile apps, the private information on your phone has been collected and sent somewhere without your knowledge. That’s the finding of the App Genome Project mammoth study by Lookout, a mobile security company that has scrutinized more than 300,000 apps on both the iPhone and Android mobile phone platforms. San Francisco-based Lookout provides security such as anti-malware for mobile phones. It decided to decipher exactly what mobile apps do when they run, and it found that apps are tapping into personal data and accessing other phone resources without telling users. The company is unveiling the survey at the Black Hat security conference this week in Las Vegas (where I will do live reporting).
App Genome Project | The Official Lookout Blog July 27, 2010 Click to enlarge infographic The App Genome Project This week at the Black Hat Security Conference, Lookout will unveil the App Genome Project, which is the largest mobile application dataset ever created. In an ongoing effort to map and study mobile applications, the App Genome Project was created to identify security threats in the wild and provide insight into how applications are accessing personal data, as well as other phone resources. Lookout founders John Hering and Kevin Mahaffey initiated the App Genome project to understand what mobile applications are doing and use that information to more quickly identify potential security threats.
ShareThis Starts Measuring Social Reach, Facebook And Twitter Account For Nearly Half When it comes to measuring how content is shared across the Web, the approaches we use today are still pretty primitive. People count how many times a link is shared on Facebook or retweeted on Twitter, but nobody really knows what percentage of those links are clicked on to drive traffic back to the original sites. ShareThis, which offers an all-in-one share button across tens of thousands of sites, is trying to address this issue with new metrics across its network that measure not only how many times a link is shared, but also how many times people act on that and click back to the article or Webpage. It calls this new metric Social Reach. The company shared some data with me about the biggest sharing services across its network, which reaches 400 million people a month.
We are inundated with so many social streams that it is easy to forget where exactly we read something. For instance, there was a story earlier today on Twitter showing better clickthrough rates than Facebook. I know I saw it somewhere, but was it Twitter, Facebook, or in an email? Introspectr Searches Your Social Streams
Search your cloud | Introspectr
By Stewart Mitchell Posted on 10 Jan 2011 at 14:01 A lawyer has played down the significance of the Twitter data mining sparked by the US's clampdown on WikiLeaks, saying that anyone using sites hosted in the United States had to accept that their data could be made available to authorities. The US security forces have come under fire after it emerged that officials had subpoenaed Twitter demanding it released information from five accounts in connection with its WikiLeaks probe - including the account details of an Icelandic MP and a Dutch computer programmer. The move has sparked outrage among civil liberty campaigners, and the Icelandic government has called for an explanation of the situation, but the basic concept of sovereign states accessing data hosted on their territory is well documented. nsumers "have to accept US snooping" on web services | Security
torproject (torproject) on Twitter
Google and Tor Project When it comes to code, Google's support has made a big difference to the Tor Project. Providing privacy and helping to circumvent censorship online is a challenge that keeps our software developers and volunteers very busy. The Google Summer of Code™ brings students and mentors in the open source community together to write code for three months every year. A lot of coding got done in a few months in 2009, and Tor was lucky to get a group of students who kept on working past the summer months to improve existing projects and support users.
“presidency.gov.lb 184.108.40.206 has recently accessed your account” | Mireille Raad