Get flash to fully experience Pearltrees
The Global Network Initiative ( GNI ) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition of multinational corporations , non-profit organizations , and universities . [ edit ] History On October 29, 2008, the Global Network Initiative (GNI) was founded upon its "Principles of Freedom of Expression and Privacy". [ this quote needs a citation ] The Initiative was launched in the 60th anniversary year of the Universal Declaration of Human Rights (UDHR), and is based on internationally recognized laws and standards for human rights on freedom of expression and privacy set out in the UDHR, the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights (ICESCR). [ 1 ] [ edit ] Profile
The technology, currently being tested in major shopping centres throughout Japan, is similar to that featured in Steven Spielberg’s Hollywood film. In one scene Cruise’s character , John Anderton, walks through a futuristic mall with digital signs, which after recognising him start showing personal advertising. “John Anderton. You could use a Guinness right about now,” one billboard announces as he walks past. NEC said each billboard had a small camera with a “flat-panel monitor” built in. As a person walks past their personal information, including their age to within 10 years and gender, is then sent to an internal computer using facial recognition software.
Persoonsgegevens zijn de olie van de 21ste eeuw. De privacyfuiken van marketeers worden geraffineerder, de roep om bescherming zwelt aan. Persoonsgegevens zijn de olie van de 21ste eeuw. Naarmate de privacyfuiken van marketeers efficiënter en geraffineerder worden, zwelt de roep om bescherming van de argeloze consument aan.
A business model describes the rationale of how an organization creates, delivers, and captures value [ 1 ] (economic, social, cultural, or other forms of value). The process of business model construction is part of business strategy . In theory and practice the term business model is used for a broad range of informal and formal descriptions to represent core aspects of a business , including purpose, offerings, strategies, infrastructure, organizational structures, trading practices, and operational processes and policies. The literature has provided very diverse interpretations and definitions of a business model.
Ali Partovi is an angel investor, startup advisor, and serial entrepreneur. He co-founded iLike , acquired by Myspace in 2009, and previously LinkExchange , acquired by Microsoft for $265mm in 1998. His portfolio has included such successes as Zappos, Tellme, Ironport, and Facebook.
Scott is an American entrepreneur and angel investor. He is best known as a co-founder of IronPort and an early advisor and board member at PayPal. Scott Banister started his career as a pioneer in the email business. He was Founder and VP of Technology at ListBot, the largest ASP for business email list hosting. ListBot was acquired by Microsoft.
The odds are pretty good that if you’re a big consumer of mobile apps, the private information on your phone has been collected and sent somewhere without your knowledge. That’s the finding of the App Genome Project mammoth study by Lookout , a mobile security company that has scrutinized more than 300,000 apps on both the iPhone and Android mobile phone platforms. San Francisco-based Lookout provides security such as anti-malware for mobile phones. It decided to decipher exactly what mobile apps do when they run, and it found that apps are tapping into personal data and accessing other phone resources without telling users. The company is unveiling the survey at the Black Hat security conference this week in Las Vegas (where I will do live reporting).
July 27, 2010 Click to enlarge infographic The App Genome Project This week at the Black Hat Security Conference , Lookout will unveil the App Genome Project, which is the largest mobile application dataset ever created. In an ongoing effort to map and study mobile applications, the App Genome Project was created to identify security threats in the wild and provide insight into how applications are accessing personal data, as well as other phone resources. Lookout founders John Hering and Kevin Mahaffey initiated the App Genome project to understand what mobile applications are doing and use that information to more quickly identify potential security threats.
When it comes to measuring how content is shared across the Web, the approaches we use today are still pretty primitive. People count how many times a link is shared on Facebook or retweeted on Twitter, but nobody really knows what percentage of those links are clicked on to drive traffic back to the original sites. ShareThis , which offers an all-in-one share button across tens of thousands of sites, is trying to address this issue with new metrics across its network that measure not only how many times a link is shared, but also how many times people act on that and click back to the article or Webpage. It calls this new metric Social Reach. The company shared some data with me about the biggest sharing services across its network, which reaches 400 million people a month.
We are inundated with so many social streams that it is easy to forget where exactly we read something. For instance, there was a story earlier today on Twitter showing better clickthrough rates than Facebook. I know I saw it somewhere, but was it Twitter, Facebook, or in an email?
By Stewart Mitchell Posted on 10 Jan 2011 at 14:01 A lawyer has played down the significance of the Twitter data mining sparked by the US's clampdown on WikiLeaks, saying that anyone using sites hosted in the United States had to accept that their data could be made available to authorities. The US security forces have come under fire after it emerged that officials had subpoenaed Twitter demanding it released information from five accounts in connection with its WikiLeaks probe - including the account details of an Icelandic MP and a Dutch computer programmer. The move has sparked outrage among civil liberty campaigners, and the Icelandic government has called for an explanation of the situation, but the basic concept of sovereign states accessing data hosted on their territory is well documented.