Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items matching "networking" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
D'coda Dcoda

09/1/07 Deep Web: Databases of Databases - 0 views

    • D'coda Dcoda
       
      entered in diigo
  • Opportunities emerge from the deep semantic web
  • Economics is the science of incentives. While the promise of searching a huge store of databases may not sound like Saturday social night at the local drive in burger joint, it does by extension, introduce new incentives.  The new technology will drive people to build databases.  A new generation of entrepreneurs will collect, organize, analyze and create – not information – but data.Database of databases of databasesThe first things entrepreneurs will organize are human knowledge data – starting with their own, then relating it to others. Not unlike the human genome project, the vast human knowledge reservoir will be mapped. Entrepreneurs will enter their communities (on line, neighborhood, work, school, church, social networks) and create a database for what other people know and parse the data in any number of important and useful databases.The reason for this is simple; data are collections of human observations.This is the only thing people are willing to pay forRead more at www.conversationalcurrency.com
  •  
    Opportunities emerge from the deep semantic web
Dan R.D.

China response 'took Google by surprise' - 0 views

  • The situation leaves Google’s other businesses in mainland China under threat, despite claims that it would stick by its research facilities, phone manufacturing and sales operations in the country.
  • A number of businesses are said to be considering their links with the company, including those run by Hong Kong billionaire Li Ka-Shing, who owns Britain’s mobile phone network 3 and runs Tom Online, one of China’s most popular web portals.
  • Faced with events yesterday, Tom has dropped Google as a partner and instead switched to Chinese rival Baidu - which self-censors - in order to provide its users with search results.
  • ...2 more annotations...
  • Other companies could follow suit, and it has been previously reported that popular sites including Sina.com and Ganji.com have been pressured to end their relationship with the internet’s most powerful company.
  • Experts suggest the move could cost the Californian company as much as $4bn over the next five years, and the affair will leave the Californian technology giant
D'coda Dcoda

New Methods - Measurement of Word of Mouth Marketing 10/04/01 - 0 views

  • A new way to measure word-of-mouth marketing Assessing its impact as well as its volume will help companies take better advantage of buzz. APRIL 2010 • Jacques Bughin, Jonathan Doogan, and Ole Jørgen Vetvik
  • Exhibit 1: Word of mouth is influential throughout the consumer decision journey. Exhibit 2: By looking at impact as well as volume, marketers can measure the effects of word-of-mouth messages more accurately.
  • Consumers have always valued opinions expressed directly to them. Marketers may spend millions of dollars on elaborately conceived advertising campaigns, yet often what really makes up a consumer’s mind is not only simple but also free: a word-of-mouth recommendation from a trusted source. As consumers overwhelmed by product choices tune out the ever-growing barrage of traditional marketing, word of mouth cuts through the noise quickly and effectively.Indeed, word of mouth1 is the primary factor behind 20 to 50 percent of all purchasing decisions. Its influence is greatest when consumers are buying a product for the first time or when products are relatively expensive, factors that tend to make people conduct more research, seek more opinions, and deliberate longer than they otherwise would. And its influence will probably grow: the digital revolution has amplified and accelerated its reach to the point where word of mouth is no longer an act of intimate, one-on-one communication. Today, it also operates on a one-to-many basis: product reviews are posted online and opinions disseminated through social networks. Some customers even create Web sites or blogs to praise or punish brands. Register to read this article.
  • ...1 more annotation...
  • Read more at www.mckinseyquarterly.com 
D'coda Dcoda

Cloud Research - IBM opens new cloud lab in Singapore [5May10] - 0 views

  • IBM is opening a cloud computing laboratory in Singapore to help businesses, government and research institutions and institutes of higher learning to design, adopt and reap benefits of cloud technologies. The new lab housed at Changi business park is part of it’s expansion of its cloud computing capabilities, and puts Singapore and the ASEAN region on the map as the eleventh cloud computing lab. This new addition will be part of the network of labs in Hong Kong, Ireland, Vietnam, China, South Africa, Japan, Brazil, India, Korea and the US.Through briefings, technology deployment and development sessions, the Singapore lab will work closely with businesses, government and research institutions and institutes of higher learning to design and deploy their own cloud environments.Read more at www.info
D'coda Dcoda

Ctrip.com's CEO Discusses Q1 2011 Results - Earnings Call Transcript [17May11] - 0 views

  • the Ctrip team has once again delivered the strong results in the first quarter, marking an encouraging start to the year 2011. Our net revenues grew 30% year-over-year and net income grew 23% year-over-year. With the solid execution, Ctrip has further enhanced its strategic partnerships, improved operating efficiency and elevated its customer service level. The Ctrip team has continued to build the brand’s strength and demonstrate industry leadership. Our hotel [ph] supply network continues to expand to satisfy the growing needs of travelers, reaching approximately 18,000 hotels by the end of March 2011 compared to 10,600 hotels at the same time in 2010. The number of hotels with guaranteed allotment rooms accounted for approximately 75% of the total hotel supply. We rolled out more options for making hotel reservations to keep for different needs of our customers. For example, Ctrip has launched the most expensive hotel group buying platform in China, with the daily participants reaching over 100 hotels. Our hotel group buying 2.0 platform features the most convenient booking process elevating service levels industry wide. Thanks to the great effort and strong execution on the product of IT, Ctrip has continued to outpace industry growth in the air ticketing sector growing far ahead of the industry average.
  •  
    This is a transcript from a teleconference on first quarter earnings of a travel company 
D'coda Dcoda

Mapmaker AND International Publishers NV Reports Loss in First Quarter 2011 [17May11] - 0 views

  • AND Chief Executive Officer Maarten Oldenhof says the company experienced a challenging start of 2011. “We are in close contact with various big companies, however we depend on the decisions of these parties and their long approval procedures. We see opportunities in the strong growing Smartphone market and social networks, such as Facebook, Groupon and Twitter. Social media on the smartphone is very powerful and location-based services are a must.” Revenue in the first four months of 2011 has declined, which has led to a loss in the first four months of 2011. Given the current size of AND, the development in revenue and results are greatly influenced by whether or not closing orders in a given period, both large and small. Further, big companies in the market are very careful with making decisions because of quickly changing market developments and especially the influence on their business models.
  • Outlook for 2011 The economic climate, market developments and business models are all very uncertain in the market for digital maps. The development of the results in 2011 will depend on the strength of the economic recovery and developments in the market for navigation and location based services. Therefore, AND is not in the position to provide an outlook for the full year 2011.
D'coda Dcoda

Badgeville & Janrain: Turning Serious Games Players Into Loyal Brand Advocates [29Apr11] - 0 views

  • “After carefully weighing our options for building a social rewards solution in-house versus integrating with a best in class technology provider, we selected Badgeville, a recognized leader in the space, for their comprehensive, lightweight and flexible platform,” said Larry Drebes, CEO, Janrain.
  • Badgeville jumped onto the scene when they won “Audience Choice” at TechCrunch last fall. Within two quarters they’ve captured 50 clients for their “white label” social rewards, loyalty and analytics platform.
  • Badgeville helps web publishers of all sizes increase audience engagement and unlock new monetization opportunities. The Palo Alto– based company provides platform that makes it easy for web publishers, to increase user loyalty and engagement. 
  • ...3 more annotations...
  • Badgeville aspires to democratize the Foursquare experience beyond retail by enabling publishers and other segments to build their own game mechanics and incentives platforms.
  • Publishers who use Badgeville can set up an account, offer defined rewards and track visitor behavior with realtime analytics. Badgeville works for any company that has a community on its site: anyone from gaming to education, to retail and more can use the service to reward people for checking into a site, taking tests or simply browsing through products. Virtually anything can correspond to a badge reward.
  • “It’s not about pageviews anymore.” Publishers can award badges for the behavior of their choice, such as leaving a comment or becoming a fan of the site on Facebook. Readers can also compare their results to friends’ on social networks like Facebook.”
D'coda Dcoda

PRACTICE Marketing: Real World Multiplayer Serious Game [18May11] - 0 views

  • Developed for McGraw Hill Higher Education Education UK, PRACTICE Marketing is a 3D turn-based Serious Game intended to teach college kids the principles of product marketing and competition. In the game, players are able to fully experience the seven underlying principles upon which to base marketing strategy and efforts: Image, Differentiation, Repeat Business, Ease of Doing Business, Networking, Likeability, and Emotion. Gameplay You’ve been selected to manage a company’s new entry into the backpack market. Your first step in the game is to create a strong product that appeals to a specific market segment and price it appropriately.
  • You are upfront presented with the info you need to analyze the market, provided by market research, who has narrowed the backpack market down to five potential segments for you to consider targeting, selecting the one that looks the most promising.
  • Once you have selected a target market, you can use the backpack builder to design a pack that meets the needs of its particular demographic.
  • ...3 more annotations...
  • Before you put it the market you have to set a competitive price.
  • Then you have to negotiate distribution agreements with retail channels and pick how the bag is marketed and advertised.
  • At the end of each turn, you can review and submit your marketing decisions and then see your quarterly /yearly P&L (Profit &Loss) data, market trends and positioning, competitors’ data and customers’ feedback, among several other results.
Jan Wyllie

The Human Algorithm [20May10] - 0 views

  • A common mistake for those seeking to cope with this profound disruption is to confuse technology with innovation. Algorithms, apps and search tools help make data useful but they can’t replace the value judgements at the core of journalism.
  • Genuine innovation requires a fundamental shift in how journalists think about their role in a changed world. To begin with, they need to get used to being ‘curators’; sorting news from the noise on the social web using smart new tools and good old fashioned reporting skills.
  • I find it helps to think of curation as three central questions: * Discovery: How do we find valuable social media content? * Verification: How do we make sure we can trust it? * Delivery: How do we turn that content into stories for a changed audience?
  • ...11 more annotations...
  • With some like-minded souls, I founded Storyful in early 2010.
  • he only way a curator can ultimately sort news from noise is to join the social media conversation which emerges from news events. Not just listen, but engage directly, openly and honestly with the most authentic voices.
  • Every news event in the age of social media creates more than a conversation, it creates a community.
  • When news breaks, a self-selecting network gathers to talk about the story. Some are witnesses – the creators of original content – others are amplifiers – passing that content on to a wider audience. And in every group are the filters, the people who everyone else looks to for judgement.
  • Twitter is the door to that community.
  • We had more profound experiences of this Human Algorithm at work in recent weeks, most notably with reports of mass graves being discovered outside the besieged Syrian town of Deraa. Interaction with Facebook groups led us to Twitter conversations and YouTube videos. E-mail conversations with US-based academics has led us to key translations and satellite imagery.
  • This is the ‘Human Algorithm’ at work; the wisdom of a social media community harnessed through open, honest and informed engagement.
  • Storyful judges the credibility of a source on social media by their behaviour and status within the community
  • Proximity to the event. • Established journalistic, academic, or official credentials. • Past behaviour on the social web. • Status withi
  • established activist/political/social media group.
  • it is the oldest journalistic skill of all which gives this process meaning and that is engagement.
D'coda Dcoda

Twitter unmasks anonymous British user in landmark legal battle [30May11] - 0 views

  • Twitter has been forced to hand over the personal details of a British user in a libel battle that could have huge implications for free speech on the web.The social network has passed the name, email address and telephone number of a south Tyneside councillor accused of libelling the local authority via a series of anonymous Twitter accounts. South Tyneside council took the legal fight to the superior court of California, which ordered Twitter, based in San Francisco, to hand over the user's private details.It is believed to be the first time Twitter has bowed to legal pressure to identify anonymous users and comes amid a huge row over privacy and free speech online.Ryan Giggs, the Manchester United footballer named as being the plaintiff in a gagging order preventing reporting of an alleged affair with a reality TV model, is separately attempting to unmask Twitter users accused of revealing details of the privacy injunction.
  • However, Giggs brought the lawsuit at the high court in London and the move to use California courts is likely to be seen as a landmark moment in the internet privacy battle.
  • Ahmed Khan, the south Tyneside councillor accused of being the author of the pseudonymous Twitter accounts, described the council's move as "Orwellian". Khan received an email from Twitter earlier this month informing him that the site had handed over his personal information. He denies being the author of the allegedly defamatory material.
  • ...1 more annotation...
  • "It is like something out of 1984," Khan told the Guardian. "If a council can take this kind of action against one of its own councillors simply because they don't like what I say, what hope is there for freedom of speech or privacy?"
Dan R.D.

frog design: Smart Brands In The Connected Age - PSFK - 0 views

  • The internet of things with its unprecedented level of connectivity does not only catalyze the rise of “social” but also the rise of “smart.” And smart means complex. Increasingly, products and services are multi-functional, multi-layered, and connected to a broader ecosystem of services, serving as a platform for added-value applications. Companies, across industries, are beginning to develop smart solutions – from smart phones, smart energy, smart healthcare, smart housing, to smart mobility, and more. Smart ecosystems have emerged as the lynchpin of innovation – as the holy grail for user experiences that brands can truly own.
  • What if “connectedness” was a new modus operandi for brands and required them to be “smart brands”? By textbook definition, smart systems are self-organized systems with built-in feedback mechanisms and the ability to constantly reorganize themselves in order to adapt to their ever-changing environment. They are capable of describing and analyzing a situation, and taking decisions based on the available data in a predictive or adaptive manner, thereby performing smart actions.
  • as Allison Fine, author of Social Change in the Connected World, puts it aptly: “It is counterintuitive but true; the more decision making we push away from the center, the more powerful our social networks become. That’s the power-to-the-edges concept.”
  • ...2 more annotations...
  • Social intelligence: Connected brands are social brands, and if they are smart, social for them means to be “socially intelligent.”
  • Social intelligence, in the most wide-ranging definition, is the capacity to “get along with people in general, social technique or ease in society, knowledge of social matters, susceptibility to stimuli from other members of a group, as well as insight into the temporary moods or underlying personality traits of strangers.” Applied to brands, social intelligence can be interpreted as the art of detecting the most subtle cue in understanding an individual’s behavior, and the ability to not only receive constant feedback but to convert it into changed behavior.
Dan R.D.

Smarter hackers lurk in smart-grid future [31May11] - 0 views

  • The internet of things, as the ultimate version of the smart grid is often described, could bring with it one of the downsides of today’s internet: hacker attacks.
  • the possibility that someone with bad intent and networking know-how could tap into the metering infrastructure and determine, for example, when a household is typically unoccupied and easier to break into.
  • The more connected our systems become, the more opportunities there will be for someone to exploit the various parts of it … as researchers studying the vulnerabilities of on-board computers in cars have already discovered.
  • ...2 more annotations...
  • As a Guardian article on the Stuxnet virus attack on Iran’s nuclear facilities notes, the capabilities of cyber-weapons have reached a “chilling new level.”
  • To paraphrase Thomas Jefferson, the price of greater energy freedom will be eternal vigilance.
  •  
    Smarter hackers lurk in smart-grid future | Energy http://diigo.com/0hm4i
Dan R.D.

Kevin Fitchard: Nokia's new interim CTO Tirri on the concept of the "Internet of Things" | the internet of things - 0 views

  • "The Invisible Internet is associated closely with the concept of the “Internet of Things,” in which a multitude of everyday objects are connected wirelessly. In such a world, not every object will have the intelligence to make decisions for itself — your carton of milk doesn’t need an advanced processor, only the ability to communicate what it is and its expiration date — but collectively they’ll create a form of ambient intelligence, allowing them to self-organize as a group. If the Invisible Internet of Things does become a reality, the Web will cease to be merely a virtual space, where people interact with one another from behind a PC or phone’s screen, and become a real space — “meat space,” if you will — where thousands of objects, both personal and public, interact with one another.
  • The one element, besides a radio, all of those objects have in common is awareness. They have to be able to sense one another as well as their surroundings. Embedding devices and objects with that kind of sensitivity probably is the smallest challenge the Internet of Things faces right now, said Henry Tirri, head of the Nokia Research Center. The core sensors needed in the network of the future already are embedded in the average smartphone today: GPS and cellular triangulation sense location; accelerometers and digital compasses sense movement and direction; digital cameras can see for the devices. Some of those sensors need to be refined, but for the most part, devices already have access to enormous amounts of raw sensory data, Tirri said. The challenge for the industry is processing that data, interpreting it and combining it with data from other sensors to make it useful. Once the technology overcomes those problems, there’s no limit to what can be wirelessly enabled, he added.
  • “In today’s world of handsets, we talk in billions; in the future, we will talk about trillions of devices,” Tirri said. “Radios and sensors will be very small. They will be in everyday devices like coffeemakers and key chains, as well as all consumer devices, but also things you wouldn’t think you’d have wireless capabilities, like chairs, tables, even your bed.”
Dan R.D.

Prone to Attack - Android Devices Saw 4x Rise In Malware [16May11] - 0 views

  • Security vendor Juniper Networks has warned users of Google’s mobile OS Android that there has been a 400 percent increase in Android malware between June 2010 and January 2011. In its “Malicious Mobile Threats Report 2011“, the company has said that Android as the dominant growing force in the mobile device market, was the biggest target of malware and exploit developers in 2010.
  • Symbian mobiles continue to remain the most prone to threats.
  •  
    Ha Ha. Iphone is secure. Isn't Apple the best.
D'coda Dcoda

North Korean 3G Mobile Subscriptions Hit Half a Million [21May11] - 0 views

  • "The number of 3G cellular subscriptions in North Korea passed half a million during the first quarter, according to the country's only 3G cellular operator. The Koryolink network had 535,133 subscriptions at the end of March, an increase of just over 100,000 on the end of December 2010."
Jan Wyllie

Wildcat: Of Onions and Infocologies Thriving in the age of hyperconnectivity [31Aug09] - 0 views

  • a sensation carried by many and is very difficult to articulate, for even though the scope and amount of information available to us is disturbing many cherished beliefs and long held assumptions, at base this sensation is pleasurable, hence we want more of it.
  • we are entering, and actually are already in, a deterritorialized age of transformation, an age unlike any other in that the speed and overload of information is transforming us, and yes destabilizing us, disrupting us in such a fashion as to allow a new kind of mind to emerge, the hyperconnected mind.
  • we have evolved to be a fluid intelligence, an intelligence for which disruption is not a bug but a feature.
  • ...16 more annotations...
  • Hyperconnectivity leads to fluid intelligence.
  • Fluid intelligence is the ability to find meaning in confusion and solve new problems. It is the ability to draw inferences and understand the relationships of various concepts, independent of acquired knowledge”
  • I have become more intelligent, clearer, more focused, faster and more appreciative of others. In fact I am more than pleased with my multitasking, multithreaded polylogue on practically every level of my existence.
  • I believe that fluid intelligence is the hallmark of our present era, an intelligence that is fundamentally  autopoietic and multidimensional;
  • think that same intelligence is in the process of adaptation, adapting itself to accommodate information overload not as a negative so called ‘distraction’ but as an attention enhancer, an explorative measure of our intellects. T
  • in our hyperconnected slipstream the very transient nature of meaning is being amplified.
  • We are at present in a transitional period of rapid advancement, an era of supreme importance in the history of humanity, a phase in our concatenated evolution in which new forms of literacy are being invented, new methods of inter-subjective enhancement are at play and we evolve because of it.
  • more than that I carry the (very subjective) feeling that I have developed a new filtering system concerning relevancy and irrelevancy, I am now able to discard or admit at a glance, if something is worthy of note to me or not, if it pertains to my (very extensive) list of interests or not.
  • A connected object, one that is a node in a network that interacts in some way with other nodes, can give birth to a hundred unique relationships that it never could do while unconnected
  • Narratives is what we are made of, our states of mind are narratives, stories within stories,
  • The paradigmatic shift is disruptive because it heralds a new story, the story of superabundance, and the superabundance starts with the wealth of information at our immediate accessibility.
  • he narrative of our hyperconnected state of affairs is one of enmeshed realities
  • the dynamics of intersubjectivity allows us to flow uninterrupted into a combined interactive intelligence, a hyper-intelligence that combines autonomous critical thinking within a larger framework of co-adaptive consensual adhocracies.
  • this very variability of multiple realities enmeshed as a coherent whole that re-describes the theme of being a hyperconnected mind.
  • in direct insights that are predominantly invisible but nevertheless inform our actions and influence our understandings. Moreover, I see the modern formless hypermind evolving in front of our eyes as the precursor of a posthuman mind that is not only better at ‘everything’ but eventually will adapt old and outdated philosophical and cognitive concepts into fresh modes of being.
    • Jan Wyllie
       
      As always significant, inspiring and disturbing. 
  •  
    Is this vision coming to pass? Or is it delayed again? Or being overtaken by events on the ground, so to speak?
D'coda Dcoda

Startup Tweets You Offers Based On Where You Check In [11May11] - 0 views

  • The latest wave of social networks document, photograph and broadcast your every move, opening an unprecedented opportunity for small businesses and big brands alike to target consumers based on their whereabouts and activities.Local Response wants to help businesses collect and respond to their customers’ public posts. The platform scans Twitter for explicit checkins to locations, like on Foursquare, as well as natural language that indicates location (ex. “I’m going to…”), and responds with Twitter @mentions on behalf of businesses. Messages most often include a coupon or offer in a bit.ly link.In other words, when customers check into a store on Foursquare, the store can send them a coupon while they are there. If customers tweet a photo through Instragram from a competing store, they might get the same coupon.
Dan R.D.

What is Coming? - The Future of Geolocation [21Apr11] - 1 views

  • Since location-based check-in app Foursquare was launched at South by Southwest in 2009, the app has seen exponential growth, reaching over 7.5 million users this year.
  • Apart from gamification through leaderboards and badges (or stickers, or pins), the motivation for users to participate in location-based networks is severely lacking.
  • 1)make it easy and 2) create value. Users want to put in less effort and receive more value.
  • ...4 more annotations...
  • developers continue to chase after our elusive social graph to make geolocation as indispensable as microblogging and photo sharing.
  • RFID (radio-frequency identification) and NFC (near field communication) technologies are going to become much more popular as geolocation apps continue to evolve and developers look for ways to make sending and receiving location-based data easier.
  • Foursquare has already begun testing NFC check-ins and Coca-Cola used RFID at last year’s Coca-Cola Village teen camp to enable Facebook Likes and status updates to be sent with wristbands.
  • What Else Can We Expect? There are some exciting innovations emerging in geolocation already, but there’s surely much more value to be had from this technology. Some of the developments I’m most interested to see are: A collection of user-generated information about a place, like a location-based Wikipedia Mobile check-in for flights, bypassing the long check-in counter queues Mobile check-in at doctors’ offices, sending the secretary an automatic notification of your arrival Mobile identification, providing entry to adult-only venues like nightclubs (our phones are already replacing cash, so why not our photo IDs?) Digital, geotagged nightclub stamps to prove you’ve paid to get in Bookmarking for places with push notifications, so you’ll finally remember to check out that café your friend keeps recommending Interactive maps attached to promotional material (with QR codes?) so you can easily find the new pizza place that sent you coupons in the mail
  •  
    That's a bit long as a clip, Dan.
  •  
    yep, I know, but now I'm going to try and edit it and see if it updates the post that got syndicated into wordpress. Also, the comments that we are posting here are updating on our wordpress blog, which is pretty cool, but strange because they are appearing at the top of the post.
D'coda Dcoda

Android Security Practices? [20May11] - 0 views

  • "Smartphone security recommendations seem to boil down to Windows-like practices: install an antivirus, run updates, and don't execute apps from untrusted sources. On my own computers, running Linux, I choose to only install (signed) packages from the distribution's or well-known repositories, or programs I can check and compile myself, or run them as a dedicated user — and I don't bother with an antivirus. What rules should I adopt on my soon-to-be-bought Android device? Can I use it purely with open-source apps and still make the most of it? Are Android's fine-grained permissions (accessing the network, contacts...) reliable? Can apps be trusted not to scan your files and keyboard for passwords and emails? What precautions do security-conscious Slashdotters take to keep control of their phones?"
  •  
    Q&A see answers at site.
D'coda Dcoda

Netflix Isn't Swamping the Internet [20May11] - 0 views

  • "Remember the Sandvine report from earlier this week that said Netflix gobbles up 30% of Internet traffic during peak hours? It needs clarification on a couple of important points, says blogger Kevin Fogarty. First, yes, Netflix traffic spikes during prime time, but only across the last mile. Second, ISPs underestimate what a 'normal' level of Internet use really is. 'When AT&T announced its data caps – 150GB per month for DSL users and 250GB for broadband – it called the data levels generous and said limits would only affect 2 percent of its customers. It turns out Netflix users take up an average of 40GB per month just from streaming media, according to a different Sandvine report (PDF).'"
« First ‹ Previous 141 - 160 of 202 Next › Last »
Showing 20 items per page