Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items matching "Policy" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

The cloud and the future of the Fourth Amendment [April10] - 0 views

  • Colorado, defending Yahoo against attempts by the federal government to obtain the contents of Yahoo Mail messages without first obtaining a warrant. One month earlier, the Justice Department filed a 17-page brief arguing that Yahoo Mail messages do not fall under current statutory protection because, once opened, those messages are not considered to be in “electronic storage.” The privacy coalition—which included Google—came to Yahoo’s defense, arguing that users with e-mail stored in the cloud have a reasonable expectation of privacy in the contents of that e-mail, and should thus be protected from warrantless searches by the government. (Hopefully the irony of Google opposing robust searches is not lost on Google’s attorneys.) Unfortunately, the protections afforded by the warrant requirement have not yet been fully extended to the digital “cloud.” This handy metaphor for the ethereal Internet as a storage and access hub is coming to have other implications: can we really conceal our data inside this cloud, shielding it from government intrusion? Read more at arstechnica.com
  •  
    Good article, do you expect to have a degree of privacy concerning your data in the cloud?
2More

10/04/19 Privacy Slips Again - Facebook Retroactively Makes More User Data Public - 0 views

  • There’s an argument circulating that we don’t care about our privacy as much as we did when Facebook rolled out with its “promises”, justifying, in part, this decision. Where do you stand? Will you take steps to remove information from Facebook to keep it from going public? See the article for clarification of Facebook’s claim that these changes are “opt in”.
  • Once upon a time, Facebook could be used simply to share your interests and information with a select small community of your own choosing. As Facebook’s privacy policy once promised, “No personal information that you submit to Facebook will be available to any user of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.”How times have changed.Today, Facebook removed its users’ ability to control who can see their own interests and personal information. Certain parts of users’ profiles, “including your current city, hometown, education and work, and likes and interests” will now be transformed into “connections,” meaning that they will be shared publicly. If you don’t want these parts of your profile to be made public, your only option is to delete them.Read more at www.eff.org
1More

No Location-Based Ads Allowed in Apps - Search Engine Watch (#SEW) [05Feb11] - 0 views

  • Apple has informed iPhone/iPod Touch application developers that they can't include location-based advertising within their apps. The move has intensified rumors that Apple is planning to launch its own mobile advertising network. Google clearly seems to be the target here. Google recently acquired AdMob, one of the most popular mobile ad networks. Will Google "retaliate" by closing down options for Android developers? It doesn't seem like that type of policy would match their m.o. What's more, by owning AdMob, it's difficult to see why they would feel threatened by other competitors. Apple's move seems to be a step in the wrong direction. Developers who put out free apps generally try to get revenue from in-app advertising. Location-based advertising, while still in its infancy, is truly the key to mobile ads. If a company can know that you're in the vicinity, they could send you a coupon incentivizing you to visit their store and make a purchase. Of course, location-based advertising should always include an opt-in or opt-out policy, but privacy doesn't appear to be Apple's main concern here. Apple did acquire mobile ad network Quattro Wireless recently.
7More

PayByPhone adds NFC to Mobile Payments for San Francisco'​s 30,800 parking sp... - 0 views

  • PayByPhone, a leading international provider of systems for parking and urban mobility payments, has announced one of the largest deployments of near field communications (NFC) payment solutions in the world. The San Francisco Municipal Transportation Agency (SFMTA), which selected the PayByPhone mobile payment system for parking, is currently adding NFC-enabled stickers to the city's 30,800 parking spaces to give drivers the option to pay for parking with NFC-enabled mobile phones in addition to mobile apps and mobile web for regular phones. All parking meters continue to accept payment with coins.
  • The PayByPhone system, already deployed in the Castro district will be extended citywide as installation of the stickers is completed. The PayByPhone NFC sticker has a passive electronic chip that does not require a battery and stores information such as the parking space number that can be read wirelessly by any NFC-enabled phone.
  • Since each meter in San Francisco will have a PayByPhone sticker, users can simply wave or tap their NFC-enabled phones over the NFC sticker on the meter to automatically launch the parking application. The mobile payment system recognizes the user, identifies the individual parking location, and the driver enters the desired parking time to complete the transaction. The system then sends a text message reminder before the parking period expires, and if needed, allows additional time to be purchased by phone from any location (subject to time limit restrictions). A receipt is automatically sent to the user's email account. Payment is processed against a credit or debit card associated with the mobile phone number.
  • ...4 more annotations...
  • "This is one of the largest deployments of NFC technology in the United States and shows the practical benefits this technology can deliver in terms of ease of use and convenience. There has been a lot of hype around NFC recently and PayByPhone is pleased to now put the technology in the field for real world applications," said Neil Podmore, VP of Business Development at PayByPhone. "We expect this to help kick start the more widespread adoption and understanding of the practical benefits of NFC in 2012."
  • The installation of mobile electronic payment systems is already catching the imagination of cities and towns around the world. With a proven role of providing parking authorities with efficient, easier-to-manage and cost effective solutions also comes real-time data to fine tune parking policies and provide parking guidance systems.
  • Analyst firm Juniper Research predicted that consumers around the world could generate as much as $50 billion in sales through NFC-based mobile payments by 2014. The potential for this nascent technology is huge, according to Jupiter.
  • PayByPhone, the largest provider of payment systems for parking across North America, has ongoing contracts in more than 60 cities, towns and universities including Miami; Dallas; Vancouver, BC; London, Paris and now San Francisco, the largest installation in the United States. Worldwide, the company handles more than 55,000 transactions per day. The company experienced rapid growth in FY 2011, logging an estimated 8 million transactions over the first six month period.
8More

SecureIDNews | Easier, better identitiy on the horizon - 0 views

  • The first of these changes is BYOD (Bring Your Own Device) computing. BYOD is a much better term than “consumerization” and really portrays the meaning that many of us are buying smart phones, tablets or laptops to use them on a work network. The tension this creates is predictable.
  • In 2012 and beyond, we’re going to see more and more different devices coming into the workplace.
  • If you use PayPass, Tap & Go, or other contactless credit cards, that’s NFC. In fact, NFC hardware already is appearing in smart phones and tablets. There are relatively few devices with NFC today, but there will be more in 2012.
  • ...5 more annotations...
  • The next of these changes is increased security on mobile devices.
  • Just a few weeks ago, Forrester Research said, “It’s time to repeal Prohibition” about Macs in the workplace, but the real changes are going to come from the smartphones and tablets.
  • Together, three trends lead to an Internet of Things, where smart phones use NFC to make statements about the physical world. For example, there has already been an art exhibition that lets visitors vote for their favorite display by tapping with their smartphone. But more importantly, there’s an Internet of Secure Things coming. You will be able to use your smartphone to badge in to work, unlock your PC, start your car or motorcycle (the prototype of that is already working), as well as merely pay for things.
  • Together, three trends lead to an Internet of Things, where smart phones use NFC to make statements about the physical world. For example, there has already been an art exhibition that lets visitors vote for their favorite display by tapping with their smartphone. But more importantly, there’s an Internet of Secure Things coming. You will be able to use your smartphone to badge in to work, unlock your PC, start your car or motorcycle (the prototype of that is already working), as well as merely pay for things. It isn’t going to all happen in 2012, but we are likely to look back at 2012 as the year when it took off.
  • It isn’t going to all happen in 2012, but we are likely to look back at 2012 as the year when it took off.
3More

Federal CIO launches mobile roadmap [11Jan12] - 0 views

  • Federal Chief Information Officer Steven VanRoekel launched an interactive dialogue on government mobile policy on Wednesday that he said would be the first step toward a governmentwide mobile roadmap due out in March. That roadmap, VanRoekel said, will address a range of issues from ways the government can save money -- such as by buying smartphones in larger quantities -- to serving citizens more effectively through public-facing apps
  • It also will include information about building internal mobile applications to help federal field officers, such as U.S. Forest Service workers and Border Patrol agents, do their jobs more efficiently. As things stand now, too many agencies and bureaus are putting time and effort into mobile projects without leveraging each other's gains, he said.
  • The dialogue will be open for 10 days and the mobile strategy should be out about two months later, VanRoekel said. Within six months, he hopes to introduce new procurement vehicles so agencies can buy smartphones and tablets more efficiently and cheaply
2More

The coming war on general computation - Cory Doctorow @ #28C3 [01Jan12] - 0 views

  • The last 20 years of Internet policy have been dominated by the copyright war, but the war turns out only to have been a skirmish. The coming century will be dominated by war against the general purpose computer, and the stakes are the freedom, fortune and privacy of the entire human race.
  • The problem is twofold: first, there is no known general-purpose computer that can execute all the programs we can think of except the naughty ones; second, general-purpose computers have replaced every other device in our world. There are no airplanes, only computers that fly. There are no cars, only computers we sit in. There are no hearing aids, only computers we put in our ears. There are no 3D printers, only computers that drive peripherals. There are no radios, only computers with fast ADCs and DACs and phased-array antennas. Consequently anything you do to “secure” anything with a computer in it ends up undermining the capabilities and security of every other corner of modern human society.
9More

Obama Tries to Bypass Congress with Deadly Global Internet Treaty ACTA [28Jan12] - 0 views

  • Before the American people were protesting the Stop Online Piracy Act and the Protect Intellectual Property Act, the president managed to sign an international treaty which would permit foreign companies to demand that ISPs (Internet Service Providers) remove web content in the United States without any legal oversight. Entitled the Anti-Counterfeiting Trade Agreement (ACTA), the treaty was signed by Obama on October 1, 2011, but it is currently a subject of discussion because the White House is circulating a petition demanding that senators ratify the treaty.
  • the White House has done some maneuvering — characterizing the treaty as an "executive agreement" — thereby bypassing approval by members of Congress. Concerned by this action of the administration, Sen. Ron Wyden (D-Ore., above left) sent a letter to President Obama in which he declared: It may be possible for the U.S. to implement ACTA or any other trade agreement, once validly entered, without legislation if the agreement requires no change in U.S. law. But regardless of whether the agreement requires changes in U.S. law ... the executive branch lacks constitutional authority to enter a binding international agreement covering issues delegated by the Constitution to Congress' authority, absent congressional approval.
  • Similarly, TechDirt observes: ... [E]ven if Obama has declared ACTA an executive agreement (while those in Europe insist that it’s a binding treaty), there is a very real Constitutional question here: can it actually be an executive agreement? The law is clear that the only things that can be covered by executive agreements are things that involve items that are solely under the President’s mandate. That is, you can’t sign an executive agreement that impacts the things Congress has control over. But here’s the thing: intellectual property, in Article 1, Section 8 of the Constitution, is an issue given to Congress, not the President. Thus, there’s a pretty strong argument that the President legally cannot sign any intellectual property agreements as an executive agreement and, instead, must submit them to the Senate.
  • ...6 more annotations...
  • Twenty-two EU member states signed the treaty at a ceremony in Tokyo on January 26. Other nations interested in signing the agreement have until May 2013 to do so. According to Wikipedia, the Anti-Counterfeiting Trade Agreement “creates a governing body outside national institutions such as the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO) or the United Nations.” The scope of the agreement includes counterfeit goods, generic medicines, and pirated copyright-protected works.
  • The provisions of ACTA grant copyright holders direct powers to demand that ISPs remove material from the Internet, without the requirement of a court order, and permit foreign influence over ISPs in the United States. Advocates of the treaty seek to give copyright holders the ability to demand that users who do violate intellectual property rights have their Internet connections terminated as a punishment. To enforce such a system would require the creation of an individual Internet ID.
  • The Electronic Frontier Foundation (EFF) reports: The same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens’ Internet connection on repeat allegation of copyright infringement (the “Three Strikes”/Graduated Response) so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers.
  • The EFF has been vehement in its opposition to ACTA, particularly regarding the secrecy surrounding the treaty negotiations. Likewise, Michael Geist, in writing for Copyright News, asserted that ACTA was “shrouded in secrecy.” He pointed out that ACTA negotiations did not include civil society groups or developing countries, noting also that “reports suggest that trade negotiators have been required to sign non-disclosure agreements for fear of word of the treaty’s provisions leaking to the public.” The European Commission denied this allegations in 2008, arguing, “It is only natural that intergovernmental negotiations dealing with issues that have an economic impact, do not take place in public and that negotiators are bound by a certain level of discretion.”
  • As noted on Wikipedia, opponents of ACTA also assert that it will impinge upon freedom of expression and communication privacy. A large number of the World Trade Organization’s 157 members have voiced concerns that the treaty would have a negative impact on trade. Others have pointed out that ACTA does not include provisions for legal safeguards protecting ISPs from liability for the actions of their subscribers. Without such provisions, ISPs will be forced to invade the privacy of their subscribers in order to protect themselves. Aaron Shaw, research fellow at the Berkman Center for Internet & Society at Harvard University, stressed that “ACTA would create unduly harsh legal standards that do not reflect contemporary principles of democratic government, free market exchange, or civil liberties.”
  • The technology news and information website ArsTechnica.com argues that ACTA encourages ISPs to collect and provide information about suspects by providing for those ISPs “safe harbor from certain legal threats.” In protest against the treaty, the hacktivist group Anonymous hacked into the Federal Trade Commission’s cybersecurity advice website on January 24, replacing the homepage with the Anonymous logo, a rap song, and a message threatening more attacks if anti-piracy legislation in Congress were to pass. According to The Next Web: The message left temporarily on OnGuardOnline referred to the Stop Online Piracy Act, The Protect Intellectual Property Act and the Anti-Counterfeiting Trade Agreement. If they pass, the message said, "we will wage a relentless war against the corporate Internet, destroying dozens upon dozens of government and company websites."
4More

Google hidden 'Ad Preferences' page reveals what privacy-row search giant thinks it kno... - 0 views

  • IT has been said that Google knows more about what you like than your own partnerNow the search giant has given a glimpse on just how much information it has collected - and who thinks you are.But it seems the famed Google algorithms are far from infallible.
  • And people taking advantage of the facility that allows the public to view what kind of consumer Google thinks they are have been amused to find themselves listed with the wrong age and even sex.Nevertheless, the knowledge that Google works so hard to profile its 350m account holders is bound to intensify the debate about privacy which flared up again this week with the announcement that the company was going to start tracking users across all of its sites, including YouTube.
  • The detailed personal 'profile' sums up many of a user's interests, along with age and gender.Google builds a detailed profile by harvesting the history of its account holders' visits to sites in its advertising network.But your age and gender are decided by those of other Google users who have visited the sites you visit, leading to the mistakes
  • ...1 more annotation...
  • One blogger from tech site Mashable found this week that Google's Ad Preferences page assume that she was middle-aged - and a man, simply because her interests included technology and computing.  The profile page, called Ad Preferences, is hidden away inside a settings menu in Google Accounts, but can be accessed directly here. This sort of in-depth profiling raises alarm bells with privacy activists. 'Consumers have increasingly digital lives and they are developing an unfathomably large data trail every day,' says Rainey Reitman, activism director for privacy group Electronic Frontier Foundation. 'There has never been another time in history where privacy was under the kind of assault it is today.'You can opt out of the tracking, or manually edit your details. Google also  does not store information on controversial subjects such as pornography. The Ad preferences page came to public attention following a sweeping change to 'privacy policy' which comes into effect on March 1, although the preferences page was launched some time ago. YouTube data, Gmail information and search data will all be used to build up ever more accurate advertising profiles and also the company claims it will make searches more personalised.
3More

Senator Has 'Serious Doubts' About Privacy of Google, Apple Location Apps [10May11] - 0 views

  • At the close of an almost three-hour hearing on cell-phone tracking, Sen. Al Franken said Tuesday that he still has "serious doubts" that consumers' privacy rights are being respected when it comes to location-based services via iOS and Android. "I think that people have a right to know who is getting their information, and a right to decide how that information is shared and used," said Franken. "After having heard today's testimony, I have serious doubts that those rights are being respected in law or in practice."
  • "We need to think seriously about how to address this problem, [especially since] mobile devices are only going to become more and more popular," he continued. "This is an urgent issue we'll be dealing with." Franken, a Minnesota Democrat who chairs the new Senate Judiciary Subcommittee on Privacy, Technology and the Law, heard testimony from Apple and Google executives today about how their mobile platforms collect and use location-based data, and what type of control users have over that information. Google said that any location-based data it collects via its Android mobile operating system is anonymous in nature and the majority of that information is deleted after one week. "The location information sent to Google servers when users opt in to location services on Android is anonymized and stored in the aggregate and is not tied or traceable to a specific user," said Alan Davidson, director of public policy at Google. "The collected information is stored with a hashed version of an anonymous token, which is deleted after approximately one week."
  •  
    Combine this with the TED talk on selective searches and it looks like a cross between 1984 and The Matrix is brewing up.
6More

Hackers For Egypt Advocate For A Better Democracy Through Technology [27May11] - 0 views

  • Post-revolution Egypt is in a state of flux overlooked by outsiders. New political parties are forming while various factions hustle for power. As Egypt gears up for free elections, tech-savvy geeks are betting that their projects will have a major impact on how people will vote.
  • A combination of academics and entrepreneurs recently worked with Egyptian activists on a “Hackathon for Egypt” that provides some interesting--and fascinating--clues.
  • Participants in the hackathon were organized by Cloud to Street, a project dedicated to aiding Egyptian activists through technology. Cloud to Street is headed up by a loose group of primarily Canadian scholars and diplomats. Approximately 75 programmers took part, as well as Egyptian activists who attended both in person and via teleconference
  • ...3 more annotations...
  • Most of the tech created at the conference was aimed at Egypt's upcoming elections, which civil-society activists have been obsessively monitoring. The upcoming vote is expected to be the first free election for a leader in Egypt's long, long history. Elections are expected to occur in October or November; the ruling military junta has been unclear on the exact date.
  • The conference's most intriguing result was a platform for crowdsourcing the new Egyptian constitution. The platform, which appears to have drawn inspiration from a similar project in Tunisia, allows users to simultaneously browse constitutional texts from multiple countries, propose articles and ideas online and to collaborate on compiling the ideas into a workable text. Owing to Egypt's special circumstances, the platform also contains extensive provisions for off-computer use--many Egyptians simply don't have regular access to either a computer or the Internet.
  • Other projects worked on at the hackathon included a web platform for training Egyptian election monitors and an interactive tool that allows voters to explore the policies of various parliamentary candidates.
5More

EU to Recommend Location Data Protections [16May11] - 0 views

  • The European Union's data protection advisory body will reportedly recommend that location data about cell phone users be subject to strict privacy protections, a move that could challenge technology company practices
  • The panel will recommend that the location data that the mobile industry collects about users to provide location-based services and target advertising should be subject to the same protections as people's names, birthdays and other highly personal data.
  • Companies shoul
  • ...2 more annotations...
  • d not only need consent to collect the information, but should have to delete it after a certain amount of time and keep it anonymous, according the panel.
  • The recommendations are not binding in themselves, but are likely to inform national policy decisions in EU countries.
2More

Tracking How Mobile Apps Track You [21May11] - 0 views

  • Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering how they must handle that data once they have it. Worse yet, few third-party apps have a privacy policy telling users what they intend to do. That was the message delivered at a hearing of the U.S. Senate committee on Commerce, Science, and Transportation held yesterday. Companies and regulators are struggling to find ways to ensure that user data is handled properly by apps installed on smart phones, but the way apps are designed makes this difficult.
  • This week, Facebook joined Google and Apple on the hot seat. But all three companies run platforms that support thousands of third-party developers, and how to make sure those apps respect users' privacy, and explain their rules, is a major question. Sen. Mark Pryor (D-Arkansas) said at the hearing, "It's not clear that Americans understand how their information may be shared or transferred."
4More

Opening government, the Chicago way [17Aug11] - 0 views

  • Cities are experimenting with releasing more public data, engaging with citizens on social networks, adopting open source software, and finding ways to use new technologies to work with their citizens. They've been doing it through the depth of the Great Recession, amidst aging infrastructure, spiraling costs and flat or falling budgets. In that context, using technology and the Internet to make government work better and cities smarter is no longer a "nice to have" ... it's become a must-have.
  • That's the kind of "citizensourcing" smarter government that Tolva is looking to tap into in Chicago.
  • "This is as much about citizens talking to the infrastructure of the city as infrastructure talking to itself," he said. "It's where urban informatics and smarter cities cross over to Gov 2.0. There are efficiencies to be gained by having both approaches. You get the best of both worlds by getting an Internet of things to grow."
  • ...1 more annotation...
  • The most important thing that Tolva said that he has been able to change in the first months of the young administration is integrating technology into more of Chicago's governing culture. "If a policy point is being debated, and decisions are being made, people are saying 'let's go look at the data.' The people in office are new enough that they can't run on anecdotes. There's the beginning of a culture merging political sensibility with what the city is telling us."
12More

Smashing The Clock [11Dec06] - 0 views

  • At most companies, going AWOL during daylight hours would be grounds for a pink slip. Not at Best Buy. The nation's leading electronics retailer has embarked on a radical--if risky--experiment to transform a culture once known for killer hours and herd-riding bosses. The endeavor, called ROWE, for "results-only work environment," seeks to demolish decades-old business dogma that equates physical presence with productivity. The goal at Best Buy is to judge performance on output instead of hours.
  • Best Buy did not invent the post-geographic office. Tech companies have been going bedouin for several years. At IBM (IBM ), 40% of the workforce has no official office; at AT&T, a third of managers are untethered. Sun Microsystems Inc. (SUNW ) calculates that it's saved $400 million over six years in real estate costs by allowing nearly half of all employees to work anywhere they want. And this trend seems to have legs.
  • Another thing about this experiment: It wasn't imposed from the top down. It began as a covert guerrilla action that spread virally and eventually became a revolution. So secret was the operation that Chief Executive Brad Anderson only learned the details two years after it began transforming his company. Such bottom-up, stealth innovation is exactly the kind of thing Anderson encourages.
  • ...9 more annotations...
  • But arguably no big business has smashed the clock quite so resolutely as Best Buy. The official policy for this post-face-time, location-agnostic way of working is that people are free to work wherever they want, whenever they want, as long as they get their work done.
  • So bullish are Anderson and his team on the idea that they have formed a subsidiary called CultureRx, set up to help other companies go clockless. CultureRx expects to sign up at least one large client in the coming months.
  • It seems to be working. Since the program's implementation, average voluntary turnover has fallen drastically, CultureRx says. Meanwhile, Best Buy notes that productivity is up an average 35% in departments that have switched to ROWE.
  • "It wasn't hugs and smiles," she says of Ressler's and Thompson's campaign. "Managers in the old mental model were totally irritated." In the e-learning division, many of Wells's older co-workers (read 40-year-olds; the average age at Best Buy is 36) expressed resentment over the change, insisting that work relationships are better face-to-face, not screen-to-screen. "We have people in our group who are like, `I'm not going to do it,'" says Wells, who likes to sleep in and doesn't own an alarm clock. "I'm like, `that's fine, but I'm outta here.'" In enemy circles, Ressler and Thompson are known to this day as "those two" and "the subversives."
  • `How are you going to measure this so you know you're getting the same productivity out of people?'"
  • Achen could see that not only was his team's productivity up, but engagement scores, or measuring job satisfaction and retention, were the highest in the dot-com division's history.
  • "For years I had been focused on the wrong currency," says Thompson. "I was always looking to see if people were here. I should have been looking at what they were getting done."
  • Achen says he would never go back. Orders processed by people who are not working in the office are up 13% to 18% over those who are. ROWE'ers are posting higher metrics for quality, too. Achen says he believes that's due to the new office paradox: Given the constant distractions, it sometimes feels impossible to get any work done at work.
  • But it's worth remembering that most big companies fail to grow at the rate of inflation. That's true in part because the bigger the company gets, the harder it is to get the best out of each and every employee. ROWE is one of Best Buy's answers to avoiding that fate. "The old way of managing and looking at work isn't going to work anymore," says Ressler. "We want to revolutionize the way work gets done." Admit it, you're rooting for them, too.
10More

Compensation Cafe: Is Your Organization Ready To Go ROWE? [26Jul11] - 0 views

  • Here are the 'Nine Commandments' of ROWE:
  • We do not post office hours or core hours. Our employees know where to be when they need to be there. We don't dictate it. Everybody has complete control over how they spend their time. All the time.
  • We do not track time for our exempt/salaried workforce. We track work getting done.
  • ...7 more annotations...
  • There are no hours-worked expectations for exempt/salaried employees. We do not talk about how many hours we work or demand 40, 50, or 60 hours out of people.
  • We do not have a tele-work policy, handbook or tele-work rules. Tele-work is so 1970's, Work is just work. It doesn't need a location label, And, we don't have flextime.
  • We do not track PTO (vacation, sick time, personal time, holiday time). It's not a benefit. Unlimited paid time off as long as the work gets done is the contemporary benefit that matters.
  • Nobody asks permission to go to an appointment, event or any other personal activity. Ever. And they don't have to inform the team or management in an effort to be polite.
  • We have adopted the Sludge* Eradication Strategy - NO SLUDGE in our workplace.
  • We NEVER put 'mandatory' on a meeting invite. Every meeting is optional.
  • We don't have any limits put on how or when we can work: "No E-Mail Fridays" and "No Meeting Wednesdays" don't exist in our organization. 
10More

Do we need defined hours of work any more? [02Sep11] - 0 views

  • Are defined hours of work an anachronism that’s holding us back? Or is the freedom to work whenever we want something still reserved for a select few, and/or a trap that causes us to work more rather than less?
  • Flexible work is something that seems increasingly popular with programmers and other online workers, for reasons that Zach Holman of the software repository GitHub described in a recent post on the GitHub blog, entitled “Hours Are Bull****.” Holman said that for most of the staff who work on the service, there are no defined working hours whatsoever — everyone is on their own schedule and they work whenever they need to in order to solve the problems that need to be solved. As he puts it:
  • Hours are great ways to determine productivity in many industries, but not ours. Working in a startup is a much different experience than working in a factory. You can’t throw more time at a problem and expect it to get solved. Code is a creative endeavor… We want employees to be in the zone as often as possible. Mandating specific times they need to be in the office hurts the chances of that.
  • ...7 more annotations...
  • Unstructured work is not for everyone That kind of approach, which management consultants like to call a “results-oriented workplace,” might be fine for a creative endeavor like programming or design, or even for businesses (like GigaOM’s) that involve brain-powered work such as writing.
  • There’s another risk Holman’s description of the new unstructured workplace brings up, something we’ve written about a lot at GigaOM, and that is the impact that this can have on the “work-life balance” of employees. Says Holman:
  • By allowing for a more flexible work schedule, you create an atmosphere where employees can be excited about their work. Ultimately it should lead to more hours of work, with those hours being even more productive. Working weekends blur into working nights into working weekdays, since none of the work feels like work.
  • Knowledge workers of all kinds find themselves answering emails or responding to text messages at all hours of the day and night, working on weekends, and so on. And the increasing globalization of many industries has just accelerated this phenomenon, since some staffers or contract workers may be in completely different time zones.
  • One thing is clear, however: This phenomenon isn’t going away; if anything, it is increasing, as more work becomes knowledge work, and as more companies try to adapt to a cloud-based and global world (flexible hours and an increase in freelance or contract work also has real benefits for companies in terms of lower costs, some of which are pushed down to the individual worker, such as the cost of health benefits).
  • Companies like VMWare are trying to help figure out how the nature of work changes when it occurs in “the cloud” and the workforce moves toward what CEO Paul Maritz calls the “post-document era.” Instead of sitting at desks moving paper around, more people are working in ways that are difficult to define, that involve streams of information that don’t start or stop at specific times.
  • Netflix has what it calls an “unlimited vacation” policy, which allows workers to take time whenever they need it, provided they arrange to have their work completed when necessary. Social Media Group, a Toronto-based consulting firm, is another that has taken this approach — one that CEO Maggie Fox described in a recent blog post.
4More

ePayments Week: The rise of location-triggered offers [25Aug11] - 0 views

  • Geofencing: As long as you're here ... One of the promises of mobile advertising — at least from the merchant's perspective — has been the potential to advertise to customers when they're near your store and can act immediately (and impulsively) on your offer. To make these location-triggered offers, merchants need to delineate a "geofence" around their retail outlets — a radius or polygonal area in which customers who have opted into a deal program can be notified on their mobiles that an offer is available nearby. Indeed, Groupon is working on adding such location-based deals to its daily offers, according to a letter sent from its general counsel David Schellhase to two U.S. Representatives who were asking about Groupon's privacy policies.
  • By some measures, 90% of all texts are opened within three minutes of receiving them.
  • Goodman said that location-triggered delivery is highly effective with "exceedingly high" response rates: between 11% and 60% of users are likely to visit a store when pinged with an offer if they're nearby, and up to 46% are likely to make a purchase.
  • ...1 more annotation...
  • With that much data, there's a back-end business for the company in aggregating and anonymizing the information so it can analyze it and feed data back to merchants on which offers are most effective and when. Indeed, the company's self-service tool with which clients can manage their offers online also includes some data tools for this type of analysis.
3More

3 Steps to Create a Global Social Media Content Plan [05Oct11] - 0 views

  • Governance can mean a lot of different things. In this context, it needs to be the foundation of the content plan. Not in terms of content creation but in terms of standards and processes for expanding into a certain market. For example, Company A wants to launch a Facebook page and Twitter channel in Latin America to support its operations into that region. A governance model will ensure that the regional marketing team has the following lined up before launch: A content plan to include frequency and context of Tweets, Facebook Updates, blog posts (or whatever relevant tools/platforms are used in that region) An established moderation policy A crisis communication plan An understanding and “buy in” of the measurement philosophy (everyone in the organization SHOULD be measuring social media the same way)
  • Content Library If it’s one thing that marketing teams in other regions lack, it’s content. The reality is that most brands do have really good content. It’s just scattered all across the internet, various internal portals and even within employees’ inboxes. Content can include videos, PDFs, spec sheets, FAQ, blog posts, infographics and the list goes on.
  • Community Management Without an active community manager, a content marketing plan will fail. A community manager will not only be responsible for actively posting and aggregating content; but he/she is essentially the face of the brand and should be sanctioned to solve customer problems. A proficient community manager will answer questions and provide real and “tangible” solutions to disgruntled customers. Additionally, he/she should have the authority to provide rewards to random customers simply for being customers.
2More

Newswire / Millennial Net, Inc. Receives Best Application of Wireless Sensor Networks A... - 0 views

  • “Wireless sensor networks are the enabling technology for key applications in defense, health care, home and industrial automation and energy management. Technology leaders have recognized this fact and are providing high end application solutions for their customers based on advanced WSN technology. The Millennial Net Energy Management System which includes LEM energy sub meters, wireless pneumatic thermostats and numerous other devices allow for monitoring and control of commercial, public and light industrial buildings of several hundred thousand square feet with unprecedented scalability and reliability, leading to substantial energy savings and ROIs of around 1 year,” said Dieter Schill, President and CEO of Millennial Net.
  • This gateway connects the networked devices to existing Building Management System via BACnet or communicates with hosted internet-based application for monitoring and control. The devices are designed to work with legacy HVAC systems, fixtures, and appliances, making it unnecessary to upgrade HVAC equipment to save energy. Energy savings are achieved by improved compliance and energy policy enforcement.
1 - 20 of 22 Next ›
Showing 20 items per page