The Interconnected World of Growth Hackers When startups are ready to scale, one challenge that often crops up is finding the right person to lead the growth charge. Stage right: the growth hacker. A good growth hacker has a burning desire to connect a target market with a must-have solution, and everything they do is measured by their potential impact on scalable growth. Below is a chart of modern-day growth hackers and the companies they’ve helped to build. (above paragraph adapted from a post by Sean Ellis) View an enlarged version of this Infographic » Click here to download a .pdf version of this infographic. Simply copy and paste the code below into the html of your website to display the infographic presented above: Sources:
The entertainment industries' copyright lobby supports an LEWP proposal to introduce Europe-wide firewall to censor and block ‘illicit’ websites: The Pirate Bay team is rallying public support to defend the free Internet and end this threat : worldnews Hacker News | Is Bitcoin the most dangerous open source project ever? Bitcoin "can be really dangerous to social news ecosystem" So you agree with the article, but you don't want people to talk too much about it on HN? I think it is a very weird position to hold. Imagine there was a very dangerous disease, should it be discussed openly in physician congresses? Yes? Why is Bitcoin so dangerous: - Could break the current economy. Ok, and so? - Bitcoin could ease the work for wrong-doers (drug traffic, etc.) This argument is very weak. - Tax Tax is the biggest issue, but let's not be in fear: Governments are very imaginative when it comes to getting money from their administrates. Every great innovation have been seen as extremely dangerous by the people in place.
Le grand firewall européen et la guerre des Internets Les attaques aux libertés numériques sont légion. En France, on en parle même plus tellement ça devient lassant… et il va falloir tenir encore au moins un an. Le soucis d’aujourd’hui est européen. A croire que la claque qu’a pris ACTA ces derniers mois, loin de calmer certains lobbys, les a incité à opérer en dessous de table. Ce n’est pas franchement une surprise, la méthode est particulièrement courante. Korben, Numerama, 20Minutes, Owni… ont relayé aujourd’hui la mise en garde de The Pirate Bay à propos du LEWP (Law Enforcement Working Party), un mystérieux groupe travail européen dont le pedigree pourrait bien se situer quelque par entre Muriel Marland-Militello et Bachar El Assad. Ce n’est donc pas le fait qu’un groupe de travail organise la censure du Net au niveau européen qui est inquiétant. Au menu, on retrouvera nos outils préférés : Tout ça pour nous servir une recette qui a démontré dans plusieurs pays une innéfficacité crasse et surtout, des abus innéluctables :
Strawberry Perl for Windows The Pirate Bay déclare la guerre des Internets en Europe L'Union européenne va-t-elle se doter elle aussi d'une sorte de grande muraille numérique, à l'image de celle ceinturant et censurant l'Internet en Chine ? Repérée par The Telegraph, une proposition défendue par le LEWP (Law Enforcement Working Party), un groupe de travail issu du Conseil Justice et Affaires Intérieures, prévoit de mettre en place un espace Schengen numérique, protégé par des frontières virtuelles. "La présidence du LEWP a présenté son intention de proposer des mesures concrètes visant à créer un unique espace européen sécurisé doté d'une sorte de 'frontière de Schengen virtuelle' et de 'points d'accès virtuels' sur lesquels les fournisseurs d'accès à Internet pourraient bloquer les contenus illicites en fonction d'une 'liste noire' européenne" est-il expliqué dans le chapitre cybercrime du document (.pdf). La proposition du LEWP pourrait conduire à la mise en place d'une sorte d'intranet géant en Europe, où chaque accès serait étroitement surveillé.
Software gives visual representation of who’s following you online By Stephen C. WebsterThursday, March 1, 2012 11:08 EDT A new piece of software released this week by browser-maker Mozilla does something unique: it provides a real-time visualization of who is tracking your movements online. The software is called “Collusion,” developed last year by Mozilla programmer Atul Varma, who became inspired to code the program after reading extensively about online privacy matters. “Each dot in the graph represents a website,” Alex Fowler, the global privacy lead at Mozilla, explained to Raw Story. While it doesn’t sound all that creepy, just wait until you see your own graph. “Mozilla’s goal is to raise awareness of users about one part of their online experience,” Fowler explained. “Policy makers have been working on this issue for some time now, so for many of the regulatory veterans to privacy Collusion won’t be a surprise,” Fowler said. (H/T: PCWorld) Copyright 2012 The Raw Story Stephen C. Stephen C.
The Great (fire)Wall of Europe. | The Waspsnest I suppose it was only a matter of time before the EUSSR got around to considering this one : Broadband providers have voiced alarm over an EU proposal to create a “Great Firewall of Europe” by blocking “illicit” web material at the borders of the bloc.Anti-censorship campaigners compared the plan to China’s notorious system for controlling citizens’ access to blogs, news websites and social networking services.The proposal emerged an obscure meeting of the Council of the European Union’s Law Enforcement Work Party (LEWP), a forum for cooperation on issues such as counter terrorism, customs and fraud. If they do try to create a European firewall along the lines of China’s then they will have to be prepared to plough in huge sums of money to get a very leaky wall. My brother is in China at the moment and was telling me about the system they have to control internet access. The only end result from this exercise will be more of our money pissed up against their firewall plans.
The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? I am a hacker, enter my world... Mine is a world that begins with school... Damn underachiever. I'm in junior high or high school. Damn kid. I made a discovery today. Damn kid. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. Damn kid. You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. Yes, I am a criminal. I am a hacker, and this is my manifesto.
The Not-So-Great Firewall of Europe I am staggered by the cluelessness of some politicians [.pdf]: The Presidency of the LEWP [Law Enforcement Working Party] presented its intention to propose concrete measures towards creating a single secure European cyberspace with a certain "virtual Schengen border" and "virtual access points" whereby the Internet Service Providers (ISP) would block illicit contents on the basis of the EU "black-list". A big hint of that cluelessness is that these people are still using the term "cyberspace" *seriously* in 2011, as is the fact that they actually think it's possible to create a "single secure European cyberspace" with "virtual borders" and "virtual access points". They only have to look at how porous the Great Firewall of China is - something that has been created and honed by experts with huge resources. Finally, they seem completely oblivious of the implications of their daft "plan": the imposition of Europe-wide censorship.
Getting Started - Google Swiffy Swiffy can be used in two ways: With the Swiffy Extension, you can directly publish to HTML5 from Adobe Flash Professional. On the Swiffy homepage, you can upload your SWF file to convert it to HTML5. Both methods will always use the most recent version of Swiffy. How Swiffy works Swiffy converts a SWF file to an HTML page that contains an efficient representation of the file as a JSON object. Supported features and browsers Swiffy supports shapes, embedded fonts, timeline animation, (dynamic) text, movie clips, buttons and scripting using ActionScript 2.0 and ActionScript 3.0. Development tips Test the output in mobile browsers Mobile devices are generally less powerful than the computer you are using to develop your animation, so it is essential to test the output on devices you are targeting. Take care when using filters Swiffy supports filters, but animated SVG filters are computationally expensive and are not supported on all mobile browsers. ActionScript support
US And EU Nations In Secret Talks To Implement “Great Firewall Of Europe” To Censor Internet Just Like China | Image via Wikipedia from Steve:_ Posted by Alexander Higgins – April 29, 2011 at 4:47 am - Permalink – Source via Alexander Higgins Blog Member nations of the European Union are in secret talks, which include the United States, to implement a “Great Firewall Of Europe” which will block and censor online content to all nations in Europe. The proposal is very similar to the China firewall which blocks access to blogs, social networking sites and all foreign news websites that publish anything that contradicts official state sponsored propaganda. We are tipped off with a post by Glyn Moody : 8. A press release on the US embassy website to Hungary informs us that the US Attorney General Eric Holder and Secretary of Homeland Security Janet Napolitano also attended the conference.
convert SWF files to HTML5 By Marcel Gordon, Product Manager, Swiffy Some Google projects really do start from one person hacking around. Last summer, an engineering intern named Pieter Senster joined the mobile advertising team to explore how we could display Flash animations on devices that don’t support Adobe Flash player. Today we’re making the first version of Swiffy available on Google Labs. Swiffy uses a compact JSON representation of the animation, which is rendered using SVG and a bit of HTML5 and CSS3. Swiffy is a great example of how far the web platform has come.