background preloader

Global Companies

Facebook Twitter

Sharing Widget, Sharing Button, Sharing Plugin - ShareThis. Global Network Initiative. Global Network Initiative. The Global Network Initiative (GNI) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition of multinational corporations, non-profit organizations, and universities. History[edit] On October 29, 2008, the Global Network Initiative (GNI) was founded upon its "Principles of Freedom of Expression and Privacy". [this quote needs a citation] The Initiative was launched in the 60th anniversary year of the Universal Declaration of Human Rights (UDHR), and is based on internationally recognized laws and standards for human rights on freedom of expression and privacy set out in the UDHR, the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights (ICESCR).[1] Profile[edit] Collaboration among stakeholders is key to the goals of the Global Network Initiative.

References[edit]

Profiling

'Minority Report' digital billboard 'watches consumers shop' - T. NEC Global. B R I G H T | vol van vernieuwing. Persoonsgegevens zijn de olie van de 21ste eeuw. De privacyfuiken van marketeers worden geraffineerder, de roep om bescherming zwelt aan. Persoonsgegevens zijn de olie van de 21ste eeuw. Naarmate de privacyfuiken van marketeers efficiënter en geraffineerder worden, zwelt de roep om bescherming van de argeloze consument aan. Ook de overheid is hard bezig haar staatsburgers tot ‘leesbare eenheden' te reduceren. ‘Het gedachtegoed dat je alles kunt weten als je het maar screent is nooit verdwenen.' Direct na de aanslag op het World Trade Center richtte het Amerikaanse ministerie van Defensie in 2001 het Information Awareness Office (IAO) op. Zo is er HumanID, kunstmatige intelligentie waarmee gezichten van personen in elke uithoek van de aardbol kunnen worden herkend. De potentie van datamining is duizelingwekkend. Digitale schaduwOnvermijdelijk valt dan de naam Google.

Een intieme een-op-een-relatie met de consument is voor veel marketeers echter niet meer voldoende. Business model. A business model describes the rationale of how an organization creates, delivers, and captures value,[1] in economic, social, cultural or other contexts. The process of business model construction is part of business strategy. In theory and practice, the term business model is used for a broad range of informal and formal descriptions to represent core aspects of a business, including purpose, business process, target customers, offerings, strategies, infrastructure, organizational structures, trading practices, and operational processes and policies.

The literature has provided very diverse interpretations and definitions of a business model. Business models are used to describe and classify businesses, especially in an entrepreneurial setting, but they are also used by managers inside companies to explore possibilities for future development. History[edit] Over the years, business models have become much more sophisticated.

Theoretical and empirical insights to business models[edit] The Untold Story of the Search Business Model. Ali Partovi is an angel investor, startup advisor, and serial entrepreneur. He co-founded iLike, acquired by Myspace in 2009, and previously LinkExchange, acquired by Microsoft for $265mm in 1998.

His portfolio has included such successes as Zappos, Tellme, Ironport, and Facebook. He was among the first to recognize the importance of the Facebook Platform, and, as this article suggests, also among the earliest to grasp the business opportunity of search. Earlier this month, Paul Graham wrote a terrific article, “What Happened to Yahoo,” blaming Yahoo’s demise on two factors. The story begins in 1996 with an 18-year-old college dropout named Scott Banister, who came up with a simple but elegant concept that turned out to be one of the best business ideas in history.

This is the true story of the search business model — a concept that John Battelle and other search historians have erroneously attributed to Bill Gross for Goto.com. The origins of search advertising: “Keywords” Scott Banister. Scott is an American entrepreneur and angel investor. He is best known as a co-founder of IronPort and an early advisor and board member at PayPal.

Scott Banister started his career as a pioneer in the email business. He was Founder and VP of Technology at ListBot, the largest ASP for business email list hosting. ListBot was acquired by Microsoft. After ListBot, Scott spent his time working with other start-ups as a board member and investor. These start-ups include eVoice, creator of the first email-enabled home voicemail service, which was acquired by AOL in 2001. Scott Banister is co-founder and Chairman of Zivity , a social networking site co-founded with his wife, Cyan Banister . Other private equity investments include Zappos.com, LiveOps, Facebook, Hi5.com, Tagged.com, iLike, and Causes.com. Milestones Scott Banister added a position as Board of Directors at Ekso Bionics . Scott Banister added a position as VP, Ideas at Idealab . Scott Banister invested in 9GAG . (7/30/12) Videos. Cyan Banister ✔ (cyantist) Free Mobile Security for Smartphones - Lookout.

Your mobile app is spying on you. The odds are pretty good that if you’re a big consumer of mobile apps, the private information on your phone has been collected and sent somewhere without your knowledge. That’s the finding of the App Genome Project mammoth study by Lookout, a mobile security company that has scrutinized more than 300,000 apps on both the iPhone and Android mobile phone platforms. San Francisco-based Lookout provides security such as anti-malware for mobile phones. It decided to decipher exactly what mobile apps do when they run, and it found that apps are tapping into personal data and accessing other phone resources without telling users. The company is unveiling the survey at the Black Hat security conference this week in Las Vegas (where I will do live reporting). At the conference, mobile security will be a hot topic. About 29 percent of the free apps on Android access a user’s location data, while 33 percent of the tens of thousands of free apps on the iPhone access location data.

App Genome Project | The Official Lookout Blog. July 27, 2010 Click to enlarge infographic The App Genome Project This week at the Black Hat Security Conference, Lookout will unveil the App Genome Project, which is the largest mobile application dataset ever created. In an ongoing effort to map and study mobile applications, the App Genome Project was created to identify security threats in the wild and provide insight into how applications are accessing personal data, as well as other phone resources.

Lookout founders John Hering and Kevin Mahaffey initiated the App Genome project to understand what mobile applications are doing and use that information to more quickly identify potential security threats. Early Findings Early findings show differences in the sensitive data that is being accessed by Android and iPhone applications, as well as a proliferation of third party code in applications across both platforms. . * Examples of third party code includes code that enables mobile ads to be served and analytic tracking for developers.

ShareThis Starts Measuring Social Reach, Facebook And Twitter Account For Nearly Half. When it comes to measuring how content is shared across the Web, the approaches we use today are still pretty primitive. People count how many times a link is shared on Facebook or retweeted on Twitter, but nobody really knows what percentage of those links are clicked on to drive traffic back to the original sites. ShareThis, which offers an all-in-one share button across tens of thousands of sites, is trying to address this issue with new metrics across its network that measure not only how many times a link is shared, but also how many times people act on that and click back to the article or Webpage. It calls this new metric Social Reach. The company shared some data with me about the biggest sharing services across its network, which reaches 400 million people a month.

Facebook is No. 1, accounting for 45 percent of all shared content. Email is No. 2 with 34 percent, and Twitter is No. 3 with 12 percent. But sharing is not Social Reach. Introspectr Searches Your Social Streams. We are inundated with so many social streams that it is easy to forget where exactly we read something. For instance, there was a story earlier today on Twitter showing better clickthrough rates than Facebook. I know I saw it somewhere, but was it Twitter, Facebook, or in an email? It’s easy enough to search the open Web, but how do you search all of your personal information streams at once? Introspectr, a personal search engine still in private beta, is part of a new class of startups trying to tackle this problem.

Another startup in this class is Greplin, which is a Y Combinator startup we’ve covered before. Introspectr, however, doesn’t seem to update its index in realtime. Search your cloud | Introspectr. Nsumers "have to accept US snooping" on web services | Security. By Stewart Mitchell Posted on 10 Jan 2011 at 14:01 A lawyer has played down the significance of the Twitter data mining sparked by the US's clampdown on WikiLeaks, saying that anyone using sites hosted in the United States had to accept that their data could be made available to authorities.

The US security forces have come under fire after it emerged that officials had subpoenaed Twitter demanding it released information from five accounts in connection with its WikiLeaks probe - including the account details of an Icelandic MP and a Dutch computer programmer. The move has sparked outrage among civil liberty campaigners, and the Icelandic government has called for an explanation of the situation, but the basic concept of sovereign states accessing data hosted on their territory is well documented. This is nothing new legally – there is a process for dealing with these issues “This is nothing new legally – there is a process for dealing with these issues.”

App Markets

Facebook. Twitter. LinkedIn. Google. Aardvark. My6sense. Tor: anonymity online. Torproject (torproject) Google and Tor Project. When it comes to code, Google's support has made a big difference to the Tor Project. Providing privacy and helping to circumvent censorship online is a challenge that keeps our software developers and volunteers very busy. The Google Summer of Code™ brings students and mentors in the open source community together to write code for three months every year. A lot of coding got done in a few months in 2009, and Tor was lucky to get a group of students who kept on working past the summer months to improve existing projects and support users. Tor also works on Libevent with Google. All of these changes in software are very exciting, but who is it all for? Political upheaval sparks protests and renewed efforts to control the flow of information online.

In times of relative political stability, governments routinely filter out international news outlets, information on reproductive health, religion, human rights and other topics deemed unfit. By The Tor Project. “presidency.gov.lb 77.42.252.18 has recently accessed your account” | Mireille Raad.

Nokia

RIM. Apple. Yahoo. Microsoft. Ibm. Insurance. Container1.