asterisk2a + online   152

Why We Can’t Look Away From Our Screens - The New York Times
In a new book, “Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked,” the social psychologist Adam Alter warns that many of us — youngsters, teenagers, adults — are addicted to modern digital products. Not figuratively, but literally addicted.
mobile  homescreen  addiction  dopamine  neuroscience  mental  health  games  online  WoW 
march 2017 by asterisk2a
Swipe right for negative self perception, says research into Tinder users | Science | The Guardian
Tinder users were more dissatisfied with their bodies and more likely to objectify their appearances than those who did not use the app, study shows [...] “People are living in a surreal world, creating these unattainable ideals and expectations that no one can meet,” said lead author Jessica Strübel of the University of North Texas. “It’s creating a 24/7 constant need for impression and appearance management.”
Online  Dating  Tinder  OKCupid  Sociology  Psychology  Selbstdarstellung  Selfie  self-esteem  self-worth  Twitter  Facebook  Instagram  YouTube  mental  health 
august 2016 by asterisk2a
The appeal of narcissists: why do we love people who'd rather love themselves? | Life and style | The Guardian
They deeply believe in their own attractiveness. They're the kings of flattery. They're really really charismatic.
narcissism  Online  Dating  Dating  personality  Selbstdarstellung  Social  Media 
june 2016 by asterisk2a
Online abuse: 'existing laws too fragmented and don’t serve victims' | UK news | The Guardian
“There are crimes now taking place – the malicious use of intimate photographs for example – which we never would have imagined as an offence when I was a PC in the 80s. It’s not just the nature of it, it is the sheer volume. “The levels of abuse that now take place within the internet are on a level we never really expected. If we did try to deal with all of it we would clearly be swamped.” [...] Earlier in the week, it emerged that the Crown Prosecution Service in England and Wales has turned to Twitter for help as it faces a worrying increase in the use of social media by perpetrators to commit crimes against women and girls, including rape, domestic abuse and blackmail.
revenge  porn  Police  online  abuse  Troll  Trolls  haters  hater  hate  speech  cyber  crime  Privacy  human  rights  blackmail  child  grooming  rape  sexual  assault  sexual  violence  Social  Media  anonymity  domestic  abuse  domestic  violence  stalking  Homophobia  racism 
march 2016 by asterisk2a
Sainsbury's to 'future-proof' with £1.3bn Argos deal - BBC News
Sainsbury's aims to "future-proof" its business with the £1.3bn offer to buy Argos owner Home Retail Group.
M&A  e-commerce  Retail  brick  and  mortar  business  pure  play  Online  Shopping  Tesco  ASDA  Walmart  Amazon  Sainsbury 
february 2016 by asterisk2a
Sports Direct is a reflection of the modern British economy | Letters | Business | The Guardian
Sports Direct seems to be a metaphor for the modern British economy. “The conscious strategy would seem to be to rely on cheap labour rather than costly investment,” as your editorial (11 December) says. It also illustrates the epidemic growth of workforce insecurity which plagues a nation scarred by the rise of the precariat. Britain is rapidly becoming the sweatshop of Europe, and this, along with bubbles in consumer debt and house prices, has been a major part in such anaemic recovery as we have seen over the past five years. [...] [ HMRC cut under austerity, can't do it's job ] //&! theguardian.com/business/sports-direct-international //&! bit.ly/1jTkmsi - transferring assets. then bringing in administrators. leaving suppliers empty.
corporate  scandal  Precariat  working  poor  precarious  work  job  security  low  pay  low  income  investigative  journalism  Whistleblower  Amazon  Retail  Online  Shopping  commodity  business  commoditization  crony  capitalism  capitalism  Wall  Street  shareholder  value  profit  maximisation  George  Osborne  industrial  policy  STEM  David  Cameron  Tories  nasty  party  underinvestment  Conservative  competitive  competitiveness  self-regulation  regulation  regulators  Zero  Hour  Contract  Contractor  exploitation  lobbyist  lobby  Lobbying  trickle-down  economics  neoliberalism  neoliberal  microeconomic  policy  macroeconomic  policy  macroprudential  policy  business  investment  productivity  output  gap  austerity  tax  evasion  tax  avoidance  corporate  welfare  white-collar  crime  subsidies  subsidizing  HMRC  Trade  Union  Workers  Union  skills  gap  accounting  scandal 
december 2015 by asterisk2a
L2 Insights: Amazon Search Visibility - YouTube
pay to play // celebrity endorsements // Amazon to Brands: Work With Us or We Will F*ck With You - youtu.be/o_uVpVTUwtk
Amazon  long-tail  Social  Media  e-commerce  pure  play  Google  Search  brick  and  mortar  business  marketing  advertising  advertisement  Amazon  Search  Platform  TOS  Newsfeed  Facebook  Online  Shopping  Google  Shopping  algorithm  SEO  Big  Data 
november 2015 by asterisk2a
Udacity Marks 1,000 Graduates from Online Education ‘Nanodegrees’ | Re/code
“I direct my work not towards what I’m best at, but where there’s impact,” Thrun said. “If you can build a self-driving car, that’s great. But if you can teach people to build a self-driving car, that’s even better.” // along the lines of great minds with small ideas (yet another consumer-entertainment-escapism product).
MOOC  Udacity  life  hacker  life  lesson  Purpose  intrinsic  motivation  missionary  vision  visionary  e-learning  online  learning  elearning  career  advice  Start-Up  advice  Start-Up  lesson  impact  career  ladder  consumer  product  disruption  disrupting  markets  Silicon  Valley  counter  culture 
october 2015 by asterisk2a
Cyber Security Expert Mikko Hyppönen Worries About Extremists With Computers | Re/code
Hypponen said hackers are moving from Europe to Syria, where officials worry they could launch attacks that shut down computer networks or damage critical infrastructure. He said the threat is so serious, a U.S. drone strike this summer targeted a British hacker who, U.S. and European officials said, had become a top cyber expert for the Islamic State in Syria. Authorities believe the hacker led the CyberCaliphate, a hacking group which in January attacked a Twitter account belonging to the Pentagon.
cyber  war  on  Terror  ISIS  cyber  security  IT  internet  security  password  security  online  security  energy  security  Smart  Grid  infrastructure 
october 2015 by asterisk2a
Lovoo Flirt-App: Hinweise auf gefälschte Profile - SPIEGEL ONLINE
[ nothing new. has been reported before about fake profiles and fake profile activity on german language dating (pay for play) portals. ] Die in dem Datenpaket enthaltenen E-Mails würden nahelegen, dass Lovoo mit erfundenen Profilen arbeitet, die automatisch aktiv werden und andere Nutzer positiv bewerten, heißt es in "c't" weiter. Außerdem sei in den Daten auch der Programmcode einer Software namens "Promoter-Creator" enthalten gewesen. Diese könnte verwendet worden sein, um Fake-Profile auf Lovoo zu erstellen, schreibt das Magazin.
Lovoo  OkCupid  Match.com  Online  Dating  Tinder  Social  Network  Network  effect  user  engagement  customer  retention  customer  acquisition  user  acquisition  user  churn  user  generated  content  MAU  Gamification 
september 2015 by asterisk2a
Debating Online Higher Education: Sebastian Thrun and Niall Ferguson - YouTube
- how do we learn? w books. w peers. and in groups. sometimes informal. proximity to like mineded (discussion, debate). << deep engagement! MOOC's don't do that. MOOC's are no magic bullet. // completion (intent) vs aspiration (as consumer). // still need online education & democratisation of education, accessible to all! // // &! bv.ms/1JaTUQ8 - It's appropriate that that schools should try to prepare children for life in the 21st century, but there's no way they can be sure life won't change as dramatically in the next decade as it did in the last 20 years. It makes sense to keep to basics. //&! Barbara Oakley: "Learning How to Learn" | Talks at Google - youtu.be/vd2dtkMINIw // &! bit.ly/1QEwedc - Computers 'do not improve' pupil results, says OECD - &! bbc.in/1Kqbhyf
MOOC  democracy  Udacity  book  University  College  online  learning  accelerated  learning  learning  curve  e-learning  elearning  bulimic  learning  learning  education  policy  capital  skills  practical  skills  skills  gap  practical  skill  set  human  capital 
september 2015 by asterisk2a
E-Commerce is a Bear — Medium
Only two start-ups have properly challenged Amazon over the past decade: Zappos and Diapers. [...] Having spent time with Tony Hsieh and Alfred Lin, the leadership duo who built Zappos, and Marc Lore and Vinit Bharara, the founders of Diapers, I can tell you: these are intense competitors who recognized the best outcome was to join forces with the industry leader. So if Amazon is the low cost winner of selling brands online, if they are acquiring their best competitors, and if their everyday low prices are available to the entire country via a mechanical turk algorithm which is guaranteed to beat you, how do you compete? [...] [ eBay pure p2p marketplace ] [...] This next generation of e-commerce companies is as much about what you exclude as what you include. // &! only up for grabs (Amazon model) is in the developing world & emerging market - for entrepreneurs - & only possible double digit returns for investors. and the battle has already begun ... since like 05/09 China/India ...
e-commerce  Amazon  eBay  commodity  business  commoditization  differentiate  differentiation  vertical  category  Jet.com  business  model  subscription  model  distribution  model  discovery  Google  Shopping  commerce  Retail  Walmart  brick  and  mortar  business  Online  Shopping  mall  USA  Europe  Zalando  emerging  market  Developing  World  emerging  middle  class  consumer  choice  consumerist  materialism  consumerism  zombie  consumer  Etsy  Marketplace  Platform  Honest  Co.  Bonobos  Warby  Parker  Nasty  Gal  Branding  Zulily  flash  sale  Gilt  Groupe  ModCloth  Birchbox  corporate  strategy  business  strategy  closetphile  Rent  the  Runway  Zappos  tradesy  pure  play  Nordstrom  Macy's  H&M  Primark  Zara  Fast  Fashion  Fashion  Industry  ASOS  John  Lewis  Marks  &  Spencer 
august 2015 by asterisk2a
Digital Dating for the A-List | Amuse
thecut.io/1hEjffR dailym.ai/1KnMaLM bit.ly/1I547x0 - // niche of a category. dating for famous one way or another. // "“Just like going to no-name in LA, Paul & Andrés or The Beatrice, you can’t buy your way in – it’s entry by association.”"
Raya  Tinder  celebrity  celebrity  culture  of  You  celeb  Online  Dating  Selbstdarstellung  OkCupid  Match.com 
august 2015 by asterisk2a
Pando: The more we Tinder, the more things stay the same
- there is no perfect out there. - The Darkest Truth About Love - youtu.be/fNy5umFAnDo // its the easiest non-scariest thing to do, to swipe. to judge. without anybody know who and why you judged, in your own privacy. vs. in public, picking a person, facing possible rejection and embarrassment. // << “I’m on Tinder, Happn, Hinge, OkCupid,” Nick says. “It’s just a numbers game. Before, I could go out to a bar and talk to one girl, but now I can sit home on Tinder and talk to 15 girls—” - vnty.fr/1KTucX7
sociology  Online  Dating  Dating  Psychology  Tinder  OkCupid  Match.com  humanity  Love  Alain  de  Botton  philosophy  Millennials  mobile  phone  mobile  homescreen  user  behaviour  friction  frictionless 
august 2015 by asterisk2a
Sebastian Thrun’s Big Business Model Shift — The Information
The Udacity CEO says the online education company has expanded revenues and achieved a profit by abandoning its initial model of charging for courses because only two percent of people were completing them. The new model of “nanodegrees” is better economically—so far.
MOOC  online  learning  e-learning 
august 2015 by asterisk2a
Tinder is not to blame – dating has always been horrific and weird | Hadley Freeman | Comment is free | The Guardian
The end of romance? Really? Dating apps may have added the word ‘swipe’ to the language of love, but these scare stories are ridiculous
Online  Dating  Tinder  OkCupid  Match.com  PoF  Dating  Social  Media 
august 2015 by asterisk2a
Tech Firm Ubiquiti Suffers $46M Cyberheist — Krebs on Security
via bit.ly/1J55suT // Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers. [...] Known variously as “CEO fraud,” and the “business email compromise,” the swindle that hit Ubiquiti is a sophisticated and increasingly common one targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. In January 2015, the FBI warned that cyber thieves stole nearly $215 million from businesses in the previous 14 months through such scams, which start when crooks spoof or hijack the email accounts of business executives or employees.
phishing  phishing  scam  spoofing  cyber  security  IT  internet  security  online  security 
august 2015 by asterisk2a
Stanford’s John Hennessy Says Online Learning Has Some Way to Go | MIT Technology Review
Stanford’s president questions whether online learning can match traditional instruction in motivating students.
MOOC  online  learning  e-learning  intrinsic  motivation 
august 2015 by asterisk2a
LinkedIn and Spiceworks Profiles are the Modern Resume - Daily Blob - March 3, 2014 - YouTube
No Writing of Resume/CV. Just Cover letter with "Find me on:" Github, LinkedIn and Spiceworks Profile. And maybe Twitter too. And personal website/blog (professional & personal). Stackexchange? << Places of your professional online persona.
Online  Persona  Profile  Social  Network  career  advice  career  IT  Professional  GitHub  linkedin  programmers  Developer 
july 2015 by asterisk2a
Last Week Tonight with John Oliver: Online Harassment (HBO) - YouTube
Online harassment is a major problem, but it’s rarely prosecuted. If only we’d been warned about this in the early days of the internet. // &! Facebook real name policy issues. // &! 'any kind of tools can be used as a weapon.'
patent  trolls  patent  troll  trolls  harassment  gender-based  harassment  sexual  harassment  Misogynie  misogyny  Patriarchy  sexism  everyday  sexism  sexismus  #GamerGate  Ellen  Pao  Online  death  threat  anonymity  Twitter  revenge  porn  Facebook  human  decency  human  being  human  progress  stalking  Privacy  Sexting  male  privilege  white  male  privilege  stigma  Reddit  Google  Search  right  to  be  forgotten  Celebgate  n00d  Celeb  Trading  Ring  gender-based  discrimination  social  construct  inferior  marginalised  marginalized  discrimination  social  discrimination  social  study  sociology  psychology  Gesellschaft  society  culture 
july 2015 by asterisk2a
David Cameron speech: I'll end welfare merry-go-round - BBC News
Cameron thinks corporations will pay living wage instead of minimum wage & hire full-time only. &! "We are all in this together." &! punishment over incentives (personal), guidance&practical help; JSA claimants are put on private agency lists who get a referral bonus if they put them in work. Scheme, since introduction it seems, was neither a success nor failure. Numbers are kept under wraps. // "It comes amid a debate over plans for £12bn in welfare cuts, the details of which have not been revealed. [...] According to the Treasury, about 4.5 million families received child and working tax credits in 2013-4, nearly 70% of which were in some form of employment. [ flexible labour market conditions (liberal economic reforms) introduced massive rise in precarious employment ] // bbc.in/1Lrsjkj - "You identify a million people who you'd like to take £1,000 away from and I'll do it." [Speech was 4 grounding a message/theme for the cuts ahead] &! bbc.in/1J2i42h bbc.in/1K9KquD bbc.in/1N5iAxq
Career  Politicians  David  Cameron  living  wage  austerity  tax  credit  working  poor  precarious  work  Precariat  Toff  Privileged  Establishment  Sozialer  Abstieg  status  anxiety  squeezed  middle  class  poverty  in  old  age  child  poverty  food  poverty  poverty  Social  Services  Public  Services  Conservative  Party  Iain  Duncan  Smith  George  Osborne  opportunist  Opportunism  IMF  OECD  Gini  coefficient  fairness  budget  deficit  mobility  income  mobility  education  policy  DWP  policy  folly  policy  error  short-term  thinking  short-term  view  underemployed  self-employment  employability  long-term  unemployment  labour  market  labour  economics  Zero  Hour  Contract  contractor  1099  Economy  Zeitarbeit  Leiharbeit  outsourcing  low  income  tax  free  income  practical  skills  practical  skill  set  vocational  education  MOOC  e-learning  online  learning  competitiveness  competitive  Future  of  Disabled  disability  child  tax  credit  working  tax  credit  microeconomic  policy 
june 2015 by asterisk2a
▶ Noam Chomsky - The Purpose of Education - YouTube
learning to learn on your own. // against indoctrination, dogma, propaganda, // student debt is a trap // exponential impact of technology, augmented intelligence, robotics, software, automation, ... hockey stick move will come/near. // framework to guide your pursuit << understand what u are looking for. otherwise will go in wrong direction. randomness. // nobel prize winners didn't publish most articles in journals, they knew what to look for. capacity to seek what is significant. (defying other peoples dogma) always willing to question whether you are on the right track or not. // education mostly seen as investment into people that create jobs/economic growth. rather than create better human beings. // taking tests can be of use to some extent. taking tests, score well, but have not interest in it, and understand very little and keep very little long-term. // better to learn to understand and explore than to score insular test questions. IT MATTERS WHAT YOU DISCOVER.
education  policy  Philosophy  Career  Politicians  Enlightenment  Liberal  Arts  Google  MOOC  e-learning  online  learning  practical  skills  practical  skill  set  dogma  Future  of  Work  Mobile  Creatives  Mobile  Creative  un-college  University  democracy  history  student  loan  debt  student  of  life  Bubble  apprenticeships  Trainee  destruction  kindergarten  authority  abuse  of  power  Moore's  Law  Software  Is  Eating  The  World  augmented  intelligence  artificial  intelligence  automation  Robotics  marketplace  marketplace  efficiencies  homescreen  life  lesson  life  hacker  self-improvement  Bulimie  lernen  bulimic  learning 
june 2015 by asterisk2a
Students 'cannot multi-task with mobiles and study' - BBC News
Researchers found that students sending and receiving messages while studying scored lower test results and were less effective at tasks such as note taking. The study examined how a generation of "voracious texters" might be affected by so many online distractions. It found that when students did not use mobiles, they were better at being able to recall information. [...] The study, Mobile Phones in the Classroom: Examining the Effects of Texting, Twitter, and Message Content on Student Learning, carried out a series of tests with 145 undergraduates. [...] "It is a common occurrence to observe students who are physically present, yet mentally preoccupied by non-course-related material on their mobile devices. "As mobile devices have deeply saturated the college student population, this problem will likely continue to pose a significant obstacle," says the study, by Jeffrey Kuznekoff, Stevie Munz and Scott Titsworth. // life hack = focus 100% without distractions, opp for procrasti
learning  focus  focused  online  learning  e-learning  bulimic  learning  Bulimie  lernen  distraction  snacking  mobile  homescreen  mobile  phone  noise  Signal  vs.  noise  pollution  Millennials  generationy  multitasking  brain  neuroscience  neurology  neurobiology  attention  attention  span  inefficiencies  efficient  efficiency  life  hacker  life  lesson  Procrastinating  procrastination  time  discipline  self-regulation  self-awareness  self-improvement 
june 2015 by asterisk2a
It's official: Google blew it with YouTube, and Facebook has caught up | Nicholas Carlson | LinkedIn
"In April, Facebook hit 4 billion views per day, matching the latest estimates available for 10-year-old YouTube." [...] This is a core mission for Facebook. Facebook has become "synonymous with mobile," Facebook ad exec Carolyn Everson says. "I think that the next frontier is becoming synonymous with mobile video." People used to share video from other sites on Facebook. In February, however, "70% of Facebook's videos were uploaded directly," Griffith reports. Griffith: "Complex Media reports average completion rates of 78% for its Facebook videos, which last two to 10 minutes." Facebook has tweaked its News Feed algorithm to favor video, according to one Facebook page owner. If you have a page with a million followers, your photos will reach 14% of your followers, your text-only posts will reach 4%, and your videos will reach 35%.
Facebook  Google  YouTube  Twitter  Yahoo!  Tumblr  Y!  Newsfeed  Video  mobile  onlinevideo  online 
june 2015 by asterisk2a
Malcolm Gladwell on the challenge of hiring in the modern world - The New Yorker Conference - YouTube
// self-taught autodidact non-computer science applicants are not doing well in traditional brogrammer interviews &! RailsConf 2014 - Keynote: Writing Software by David Heinemeier Hansson - https://youtu.be/9LfmrkyP81M
Software  Development  HR  human  resources  programmers  Programming  computer  science  STEM  vocational  education  continual  education  e-learning  online  learning  MOOC  hiring  skills  mismatch  education  policy  practical  skills  practical  skill  set 
may 2015 by asterisk2a
Marco Rubio Takes Mark Halperin to School - YouTube
min 4 - liberalising student loan's, making student loans a pure private entity. lol. what could go wrong? the small print. the "selling" of said in-transparent contracts. where in the USA, you can't default on your student loans - they are exempt from private bankruptcy proceedings.
re-training  vocational  education  education  policy  apprenticeships  e-learning  online  learning  practical  skills  practical  skill  set  College  un-college  MBA  University  student  loan  debt  Bubble  studentdebt  StudentLoans  Marco  Rubio 
may 2015 by asterisk2a
The Top 6 Tech Skills You Need in 2015 | Inc.com
Technology is one area that no one in any industry can afford to grow complacent about--tech is changing so quickly that skills you mastered last year may already be outdated. In such a quickly evolving industry, information decays at a rate of 30 percent a year, according to Research in Labor Economics, rendering nearly a third of last year's tech-related knowledge irrelevant.
e-learning  Future  of  Work  Mobile  Creatives  Mobile  Creative  vocational  education  education  policy  practical  skills  practical  skill  set  STEM  Programming  Software  Development  Software  Is  Eating  The  World  online  learning  learning  curve  Industrial  Revolution  2.0 
may 2015 by asterisk2a
Monica Lewinsky: The price of shame - YouTube
In 1998, says Monica Lewinsky, “I was Patient Zero of losing a personal reputation on a global scale almost instantaneously.” Today, the kind of online public shaming she went through has become a constant. In a brave talk, she takes a look at our “culture of humiliation,” in which online shame equals dollar signs — and demands a different way.
Social  Media  self-censorship  compassion  troll  shitstorm  trolls  haters  hater  Public  Life  barriers  to  entry  Privacy  celebrity  culture  celebrity  of  You  Selbstdarstellung  Selbstfürsorge  YouTube  Twitter  Facebook  Instagram  Vine  Periscope  Meerkat  prejudice  judgement  personal  development  harassment  bullying  mobbing  cyber  mobbing  cyber  bullying  online  harassment  human  decency  human  tragedy  dehumanisation  subhuman  human  being  revenge  porn  childhood  childhood  development  mental  health  Millennials  cruelty  Reality  TV  gossip  Paparazzi  Celebgate  n00d  Celeb  Trading  Ring  Snapchat  Public  Shaming  Tabloid  TMZ  Daily  Mail  pageviews  Glossy  Magazine  desensitized  homophobic  Homophobia  transphobia  Transphobic  Desensitization  culture  society  Zivilgesellschaft  gesellschaft  empathy  adoptarefugee.org  Brené  Brown  lesson  hacker  Western  World  psychology  sociology  #GamerGate 
may 2015 by asterisk2a
After Your Job Is Gone | TechCrunch
Future  of  Work  Mobile  Creatives  Mobile  Creative  Software  Is  Eating  The  World  Robotics  autonomous  car  self-driving  cars  algorithm  automation  first  homescreen  phone  Peak  Peak  Jobs  self-employment  Zero  Hour  Contract  contractor  precarious  Precariat  working  poor  crony  capitalism  shareholder  value  profit  maximisation  globalisation  globalization  borderless  flat  competitiveness  competitive  competition  freelance  freelancing  competitive  advantage  education  policy  Share  Economy  Service  Sector  Jobs  Niedriglohn  Niedriglohnsektor  industry  Services  on-demand  convenience  austerity  Universal  Basic  Income  welfare  welfare  state  social  safety  net  minimum  wage  living  wage  Makers  Career  Politicians  protectionism  Uber  public  transportation  transportation  AirBnB  Postmates  Lyft  disposable  squeezed  middle  class  social  cohesion  democracy  No  Representation  Wall  Street  outsourcing  1099  Economy  3D  printing  industrial  policy  Manufacturing  Mittelstand  SME  SMB  Leadership  Programming  STEM  Bulimie  lernen  online  learning  e-learning  Google  vocational  education  Sozialer  Abstieg  Soziale  Marktwirtschaft  marginal  cost  economics  of  economics  economics  abundanc 
may 2015 by asterisk2a
Last Week Tonight with John Oliver: Standardized Testing (HBO) - YouTube
tests don't reflect ability. its Bulimie learning. learning for the test. not the subject or field. // profit - capitalism has invaded education.
education  policy  Future  of  Work  Mobile  Creatives  Mobile  Creative  innovator  innovation  dogma  destruction  Career  Politicians  human  progress  PISA  practical  skills  practical  skill  set  OECD  USA  American  Dream  post-racial  America  Gini  coefficient  social  mobility  income  mobility  downward  mobility  Bulimie  lernen  e-learning  vocational  education  online  learning  Ofsted  Privatisation 
may 2015 by asterisk2a
Kommentar: Warum die aktuellen Erkenntnisse über das Versagen des Kanzleramtes bei BND-Aufsicht schon lange abzusehen waren | netzpolitik.org
"Beihilfe." // &! Eiertanz: Viele, viele naive Fragen zum BND-Skandal - youtu.be/y9pRz5KQ6vo // &! Wirtschaftsspionage für Amerika? "Das Ganze ist ein Riesenskandal", sagt Hans-Christian Ströbele (Grüne) zur BND-Spitzelaffäre. - on.fb.me/1GznzV8 profiling of EU politicians, policy makers as well as EADS, EuroCopter and other stuff, shows that War on Terror, Drugs, and organised crime as a pretence is wrong to a certain extent, it shows that power corrupts and absolute power corrupts absolutely. // &! Der BND-Skandal - Worum geht's eigentlich? youtu.be/pcGzfv-Fndc // &! on.fb.me/1POvdPJ - Was ist mit der Bundeskanzlerin? Wann spricht sie zum BND-Skandal? // German intelligence agency knew NSA was spying on European leaders as early as 2008 - bit.ly/1DEvH3h "It was too worried about the NSA retaliating by limiting the information it shares." Stockholm Syndrome. No Leadership. Only Career Politicians.
surveillance  state  Orwellian  NSA  BND  cyber  espionage  corporate  espionage  industrial  espionage  Five  Eyes  GCHQ  Angela  Merkel  barackobama  presidency  GroKo  Career  Politicians  transparency  democracy  No  Representation  FBI  Torture  accountability  profiling  military–industrial  complex  cyber  crime  cyber  security  cyber  war  Foreign  Intelligence  policy  affairs  USA  World  Police  relations  corruption  abuse  of  power  Edward  Snowden  Privacy  Internet  Privacy  encryption  IT  National  security  cybersecurity  online  security 
april 2015 by asterisk2a
YouTube turns ten today. But will it survive the next ten years without losing its soul? | PandoDaily
None of these competitors have the same online video cachet and entrenched community of viewers that YouTube has. But when consumer adoption and ad spending is on such a steep uptick in a particular space, it’s shocking how quickly a market lead can erode. Just ask Myspace. [...] “I don’t think they’re going to necessarily lose their partners because of that, but it brought into question the type of partner Youtube is. Initially, to a lot of creators, they felt they could live an entirely independent life through creative ambitions. they felt like YouTube was there to support [them], and now it seems like this is a real business thing, and now YouTube is getting a little greedier.” [...] it will remain an indispensable marketing tool.
YouTube  online  video  Google  content  discovery  content  distribution  content  creator  digital  artist  Vessel  Tumblr  Facebook  Snapchat 
april 2015 by asterisk2a
Aaron Levie (Box): The First $250m in ARR - YouTube
IPO growth-stage party round, Investors work understanding SAAS business, but do not understand it 110%. "Our growth is dependent on the level of investment (sales, marketing) we put into, we have no head ceiling. [...] Investors go, after explaining for 30 minutes, from IBM cash flow investors to a16z type doubling down [invest more in user acquisition due to lock-in and LTV for SAAS. [...] Box's disruption playbook via lots of layers/stacks (integrated, worry free) for enterprise; loss prevention, security, search, clouds storage, audit & compliance (ie HIPPA). [...] Marrying a frictionless consumer experience best practices (phablet, smart phone, tablet, desktop) with Enterprise 2.0/SAAS feature set, enabling lift of productivity and connectedness. Turning themselves into a strategic layer for Fortune 500 companies and ousting Oracle, IBM and MSFT (legacy infrastructure, see Sony hack). Box is pitching a modern architecture, not just cloud. [...] Building what customer asks for.
IPO  Box  Enterprise  2.0  SAAS  DropBox  Google  Drive  One  Drive  Microsoft  Google  Amazon  Cloud  Drive  Apple  iCloud  Spideroak  disruption  cyber  security  internet  security  IT  online  security  Salesforce  Aaron  Levie  Start-Up  lesson  Start-Up  advice 
april 2015 by asterisk2a
Tinder hooks up with Instagram in a perfect match of two rose-tinted, narcissistic apps | PandoDaily
keeping up with the Jones has reached a new low with FB, Instagram, Tinder and Co. // "Instagram isn’t about reality – it’s about a well-crafted fantasy, a highlights reel of your life that shows off versions of yourself that you want to remember and put on display in a glass case for other people to admire and browse through. It’s why most of the photographs uploaded to Instagram are beautiful and entertaining slices of life and not the tedious time in-between of those moments, when bills get paid, cranky children are put to bed, little spats with friends."
Tinder  Instagram  status  symbol  status  anxiety  social  status  socioeconomic  status  superficial  Celebrity  of  You  Selbstdarstellung  Selbstfürsorge  Facebook  narcissism  Online  Dating  Philosophy  social  science  sociology  authenticity 
april 2015 by asterisk2a
Former Homeland Security head tells Pando why he doesn’t trust his fitness data to the cloud | PandoDaily
“One shouldn’t default to the position that connecting everything is perfect.” Chertoff tells Pando he also applies a kind of digital “Washington Post test” to his activities that require him to allow any of his data to be captured by a product or service. (That’s a reference to the litmus test among politicians of a certain vintage, weighing whether they’d be ok with the Washington Post finding out and printing a particular thing they’ve done or said.) All of us, Chertoff says, should treat our data online with the same degree of care with which we guard our reputation. [...] [ book “Terms of Service"] [...] It also wasn’t that long ago that Apple had a major security breach with iCloud. You can’t change your fingerprint. But the safest way to guard sensitive information is not to collect it in the first place. [ everything in the cloud is at risk. period, private data that can, if stole, put your well-being at risk, should not be there without merit/reason.]
Internet  Privacy  Privacy  Cloudstorage  IT  Security  cyber  online  password  Public  Life  Twitter  Facebook  self-censorship  quantified  self  IoT 
april 2015 by asterisk2a
Apple iOS Hardware Assisted Screenlock Bruteforce | Hacker News
So it cuts power before the iPhone can store that a failed attempt occurred. It's such a simple, stupid, wonderful idea. I love it. Kudos to whoever came up with it.
Hacking  white  hat  hacker  black  hat  hacker  security  NSA  GCHQ  Five  Eyes  cyber  security  Privacy  Internet  Privacy  online  security  IT  Apple  password  security 
march 2015 by asterisk2a
The revolution that’s changing the way your child is taught | Ian Leslie | Education | The Guardian
But the myth of the magical teacher subtly undermines the status of teaching, by obscuring the extraordinary skill required to perform the job to a high level. It also implies that great teaching cannot be taught. &! Carol Dweck: The power of believing that you can improve - https://youtu.be/_X0mgOOSpLU
education  policy  competitiveness  competitive  advantage  competitive  childhood  development  childhood  growth  mindset  learning  curve  online  learning  learning  e-learning  psychology 
march 2015 by asterisk2a
Start Ups Should Prioritize Security, Even at the Earliest Stages - YouTube
>> weakest link is human being in the middle - thus need advisory/consulting/one person hire whose sole focus is it to make the org and tech secure and the people savvy. &! &! Five Easy Steps to Secure Your Startup - https://www.youtube.com/watch?v=SBWHWCFm9xQ - 1. get rid of MS Office - use Google Docs or other secure online secure office docs replacement / 2. Use ONE dedicated machine for online banking/finance (netbook) / 3. two-factor authentication - especially email / 4. do background checks / 5. plus teach savvyness in password choice and tools, general awareness and general security issues ie targeted phishing etc etc - on regular (updated) basis ... "most if not all attacks start with phishing"
IT  Security  Start-Up  lesson  Start-Up  advice  cyber  war  cyber  attack  DDoS  encryption  cryptography  Cryptopocalypse  cyber  cyber  crime  internet  online  password  phishing  phishing  scam  two-factor  authentication 
february 2015 by asterisk2a
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
see Planning section; all the vectors of attack // and the weakest component is almost always the human being in some sort of way.
corporate  espionage  cyber  espionage  industrial  espionage  espionage  Foreign  Intelligence  NSA  CIA  surveillance  state  Orwellian  IT  Security  cyber  internet  online  password  cyber  war  cyber  attack  cyber  crime  FISA  Court  Warrant  wiretapping  FISAAA  black  hat  hacker  white  hat  hacker  phishing  phishing  scam 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
Security Nightmares 2014 [31c3] mit Frank Rieger & Ron - YouTube
see last 2 minutes, regular change of passwords and encryption method. &! Black Hat USA 2013 - The Factoring Dead: Preparing for the Cryptopocalypse - http://youtu.be/33RbRid1deo
encryption  password  integrity  password  security  cryptography  cryptowar  cryptopocalypse  internet  security  cyber  security  online  security  Five  Eyes  NSA  GCHQ  surveillance  state  Orwellian 
february 2015 by asterisk2a
Employee Data Breach The Worst Part Of Sony Hack | TechCrunch
Hackers found a file with Sony usernames and passwords called “Usernames&Passwords.” Sony Director of Information Security Jason Spaltro even gave an interview in 2007 whose whole point was to revel in Sony’s security loopholes: “it’s a valid business decision to accept the risk” of a security breach. “I will not invest $10 million to avoid a possible $1 million loss,” he said at the time. This hack is estimated to cost Sony $100 million after all is said and done. The last one cost the company a cool $171 million. &! &! http://techcrunch.com/2014/12/15/why-its-right-to-report-on-the-sony-hack/
Sony  hack  black  hat  hacker  leak  Big  Data  Privacy  Internet  Privacy  cyber  security  security  online  security  password  security  Hacking 
january 2015 by asterisk2a
Sure Stripe has more cash, but does it have a path to exit? | PandoDaily
The problem with raising capital at nosebleed valuations is that the number of scenarios under which a positive outcome is possible becomes greatly diminished. By raising at $3.5 billion, Stripe, [... and Investors ...] — are betting that the company can exit at or above $7 billion. That’s a steep price and largely eliminates acquisition as an option. The list of potential acquirers is likely limited to Facebook, Google, Apple, eBay, Amazon, and Alibaba in the tech sector. On the financial side, there are the large banks and credit card companies. But it’s hard to see anyone ponying up $7 billion to acquire Stripe, which has yet to prove that it has a sustainable business or attractive margins. [...] Not every round requires a doubling valuation, and in this case, it may turn out that everyone involved would be better if more modesty was applied. [...] [ Merger of Square & Stripe as worst case scenario? ] [ & IPOs to forget - Box, Groupon, Zynga, HortonWorks ... ]
Venture  Capital  Stripe  Apple  Pay  PayPal  Google  Wallet  Bitcoin  Amazon  Alibaba  Rakuten  Silicon  Valley  growth  round  exitstrategy  exit  strategy  IPO  M&A  business  model  margin  AliPay  Braintree  mobile  first  mobile  homescreen  Platform  network  effect  economies  of  scale  scaling  scale  Venmo  valuation  ycombinator  Unicorn  Square  Wall  Street  mobile  payments  online  payments  creditcard  Visa  Mastercard  payments  micropayments  Start-Up  lesson  Start-Up  advice 
december 2014 by asterisk2a
Was Mega-Shoppingcenter mit unseren Städten machen | SWR Kunscht! - YouTube
dying of high street. regeneration has to be done by them living there. re- purposing. gluecksgefuehle beim shoppen. &PRIMARK
High  Street  Mall  Shopping  Centre  Online  Shopping  Konsum  Consumerism  consumerist  zombie  consumer  consumer  choice  disposable  income  urban  planning  urbanisation  city  living  capitalism  Dopamine 
october 2014 by asterisk2a
BBC News - Only 100 cybercrime brains worldwide says Europol boss
"One bad apple can taint an orchard. Yet, that does not justify burning down the orchard just to find that one apple." via @grady_booch & "Encryption and anonymity protect you from identity theft. But @TroelsOerting complains that citizens use these tools!" via @je5perl & "you have right to privacy but that doesn't mean that you have the right to anonymity," Europol boss" via @fborgesius & "Interview with the head of Europol's “Cybercrime Centre”. I’d claim to be amazed at the ignorance, but I’d be lying." via @stilkov
cyber  crime  black  hat  hacker  organised  crime  cyber  war  cyber  attack  cyber  espionage  corporate  espionage  encryption  Internet  Privacy  cyber  security  online  security  security  anonymity 
october 2014 by asterisk2a
A third-party Snapchat client has leaked tens of thousands of user photos | The Verge
Hackers release a giant database of intercepted @Snapchat media collected over a yr; the SnapSave app & Snapsaved.com web client are possible sources; @4chan users are creating a username-searchable db of 13GB of content in what's been dubbed 'The Snappening' + http://www.businessinsider.com/snapchat-hacked-the-snappening-2014-10 "[SnapSaved.com or Snapsave ] What its users didn't realize was that the site was quietly collecting everything that passed through it, storing incriminating Snapchats on a web server, with the usernames of senders attached. [...] Half of Snapchat's users are teenagers between the ages of 13 and 17." - !+ http://venturebeat.com/2014/10/10/snapchat-responds-to-nude-photo-hack-passes-blame-to-users/ +! http://www.bbc.co.uk/news/technology-29569226 & http://www.theguardian.com/technology/2014/oct/13/third-party-snapchat-site-claims-says-pics-were-hacked-from-server
The  Snappening  cyber  security  Platform  Internet  Privacy  Privacy  Celebgate  security  online  security  Hacking  cyber  attack  TOS  Snapchat  n00d  Celeb  Trading  Ring  4chan  AnonIB 
october 2014 by asterisk2a
Men Blaming Jennifer Lawrence & Kate Upon for Nude Pics Leak, Hate NSA Spying - YouTube
http://techcrunch.com/video/samsung-gear-icloud-hacks-and-sarah-goes-to-burning-man/518402327/ - "Samsung Gear, iCloud Hacks And Sarah Goes To Burning Man - September 5, 2014" +++ !!! >>> http://betabeat.com/2014/09/spare-us-the-sanctimony-the-gross-hypocrisy-of-online-media-in-the-nude-photo-leak/ >> via http://www.reddit.com/r/TrueReddit/comments/2ffxoj/spare_us_the_sanctimony_the_gross_hypocrisy_of/ "No one complained about the release of Pam Anderson's wedding sex tape. No one complained about the relase of Scarlett Johansson's pics. People mocked Anthony Weiner, people mocked Hulk Hogan. I mean honestly, mocking? You are not offended for them? You are not hurt, you are really honestly mocking them? But if it suddenly happens to some one you happen to like then its awful and horrible and no good." +++ WORLD NEEDS MORE FEMALE HACKERS - youtu.be/UrsJHB8C36Q +++ wrd.cm/1q8LJiP +++ bit.ly/1wcMZSB +++ !!! bit.ly/1xqBDPb !!!
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship  hypocrisy  Daily  Mail  News  Corp.  Gawker  Tabloid 
september 2014 by asterisk2a
After celebrity nude leaks, Apple is finally taking security a little more seriously | PandoDaily
Now it seems that Apple is at least attempting to make its efforts to fix obvious security problems with its service a little easier to understand. I’m sure that has more to do with the allegations that it was responsible for the reprehensible leak of stolen nude photographs than with a new sense of responsibility to consumers, but we’ll have to take what we can get. Maybe the lesson will stick and the company will decide to be a little more forthcoming in the future. There is no reasonable expectation of perfect security in modern society, but we can at least strive for transparency from companies like Apple when our privacy is threatened. Better to know that something can’t be kept secure than to think it’s safe and remain ignorant of any threats.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  The  Fappening  TheFappening  iCloud  rippers  Privacy  Internet  Privacy  DAU  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  Social  engineering  phishing  brute  force  attack  communication  PR  public  relations  language 
september 2014 by asterisk2a
« earlier      
per page:    204080120160

related tags

#GamerGate  &  2.0  3D  4chan  21stcentury  Aaron  Abstieg  abundance  abuse  Academy  accelerated  accountability  accounting  acquisition  ad  added  addiction  adoptarefugee.org  adoption  ads  advantage  advertisement  advertising  advice  affairs  age  Agency  AirBnB  Alain  algorithm  algorithms  Alibaba  AliPay  alpha  Amazon  America  American  and  Andreessen  Angela  AnonIB  anonym  anonymity  anonymous  anxiety  AOL  app  apparel  Appification  apple  apprenticeships  artificial  artist  Arts  ASDA  ask.fm  ASOS  Assange  assault  attack  attention  audience  augmented  austerity  authentication  authenticity  authority  automation  autonomous  avoidance  AWS  backdoor  backdoors  backup  bank  banking  banner  barackobama  barriers  Basic  bathroom  be  bed  bedding  bedroom  behavior  behaviour  behind  being  beings  Belgacom  beliefs  Berlin  big  Birchbox  Bitcoin  black  blackmail  blame  blamegame  blog  blogging  blogosphere  Blue-collar  BND  boden  Bonobos  book  books  borderless  Botton  boutique  Box  brain  Braintree  Brand  Branding  Brené  brick  brogrammer  Brown  brute  bubble  budget  bulimia  bulimic  Bulimie  bullying  Bumble  Bundestags  business  cablegate  Cameron  campaign  Campus  capital  capitalism  car  carbonemission  carbonfootprint  career  cars  category  catfish  catfished  celeb  Celebgate  celebrity  Centre  chair  change  charts  cheating  child  childhood  China  choice  churn  CIA  city  class  clone  closetphile  clothes  clothing  cloud  cloudcomputing  Cloudstorage  cMOOC  Co.  coefficient  cohesion  collaboration  college  comcast  comments  commerce  Commissioner  commoditization  commodity  communication  communism  compassion  competition  competitive  competitiveness  complex  computer  computing  conanobrien  conforming  consent  Conservative  construct  consumer  consumerism  consumerist  content  continual  Contract  contractor  convenience  copycat  Corp.  corporate  corruption  cost  counter  course  Coursera  Court  Courts  creation  Creative  Creatives  creator  credit  creditcard  crime  crisis  crony  cruelty  cryptography  cryptopocalypse  cryptowar  CSR  culture  curve  custom  customer  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  Daily  darknet  DARPA  data  datamining  dating  Dattch  DAU  David  DDoS  de  death  debt  decade  decency  decor  decorating  defamation  deficit  dehumanisation  democracy  Desensitization  desensitized  design  designer  designers  destruction  Developer  Developing  development  diagram  diagrams  differentiate  differentiation  digital  Dilemma  disability  Disabled  discipline  discount  discovery  discrimination  disposable  disrupting  disruption  distraction  distribution  divide  dogma  DOJ  domain  domestic  dopamine  downward  draw  Dream  Drive  Dropbox  DropBox  Drugs  Duncan  DWP  e-commerce  e-learning  Eating  eBay  eBooks  ecommerce  economics  economics.  economies  economy  edu  education  Edward  edX  effect  efficiencies  efficiency  efficient  ego  einrichtung  elearning  Ellen  emerging  empathy  employability  employment  encryption  energy  engagement  engineering  english  Enlightenment  Enterprise  entitlement  entry  ephemeral  equality  error  espionage  Establishment  ethical  ethics  Etsy  EU  EU-Digitalkommissar  Europe  Europol  evasion  everyday  exercise  exit  exitstrategy  experience  exploitation  extrovert  Eyes  facebook  factor  fairness  Fake  False  Fappening  fashion  Fast  FBI  Female  feminism  feminist  Fetish  filesharing  film  filter  finance  first  FISA  FISAAA  Fish  fitness  Five  Flag  flash  flat  flickr  FNAC  focus  focused  folly  food  footwear  force  foreign  foreignaffairs  forgotten  formal  forms  forum  Founders  frames  Francisco  free  freedom  freelance  freelancing  Fremdgehen  friction  frictionless  friendscout24  full  Funnel  furniture  Future  G  Gal  games  Gamification  gap  Gawker  GCHQ  gender  gender-based  generated  generation  generationy  geopolitics  George  german  gesellschaft  Gilt  Gini  GitHub  glasses  Glenn  global  globalisation  globalization  globalwarming  Glossy  gmail  google  Google+  googleapps  googledocs  gossip  governance  gratification  Greenwald  Grid  GroKo  grooming  Group  Groupe  groupthink  growth  Gymnasium  Günther  H&M  hack  hacker  Hacking  Hacktivism  Happn  harassment  hat  hate  hater  haters  health  Her  High  Higher  hiring  history  HMRC  home  homescreen  Homophobia  homophobic  Honest  Hour  house  HR  hulu  human  humanity  hypocrisy  IAC  Iain  iCloud  ideas  Identity  imbalance  IMF  imgur  immersion  impact  Impediments  in  income  industrial  industry  inefficiencies  inequality  inferior  infrastructure  innovation  innovator  Innovators  inspiration  Instagram  instant  integrity  intelligence  interior  internet  Interpol  Intimate  intrinsic  introvert  investigative  investment  IoT  IPO  IPTV  Is  ISIS  IT  itunes  jail  jeffbezos  Jet.com  job  Jobs  jock  John  journalism  journalismus  journals  judgement  Julian  junk  Justice  kaufen  Khan  kindergarten  knowledge  Konsum  Kyoto  labour  ladder  Lala  language  languages  Law  Leadership  leak  learning  Leiharbeit  lenses  lernen  lesson  Levie  Lewis  LGBTQIASP  Libel  Liberal  library  life  linkedin  living  loan  lobby  Lobbying  lobbyist  long-tail  long-term  lost  Love  Lovoo  low  luxury  Lyft  M&A  machine  macroeconomic  macroprudential  Macy's  Magazine  Mail  Makers  male  mall  management  Manufacturing  Marc  Marco  margin  marginal  marginalised  marginalized  market  marketing  marketplace  markets  marketshare  Marks  Marktwirtschaft  masculinity  Mastercard  Mastery  Match.com  materialism  MAU  maximisation  maximization  MBA  media  medienkompetenz  medienwandel  Meerkat  men  mental  Merkel  metadata  microeconomic  micropayments  microsoft  middle  military–industrial  Millennials  Mindfulness  mindmapping  mindset  minimum  misleading  mismatch  Misogynie  misogyny  missionary  missmatch  mit  Mittelstand  mobbing  mobile  mobility  ModCloth  model  moderation  moebel  monetization  money  MOOC  Moore's  moral  morals  mortar  motivation  movie  movies  multitasking  music  musicindustry  möbel  n00d  narcissism  nasty  National  nbc  nbcuniversal  neoconservatism  neoconservatives  neoliberal  neoliberalism  net  network  neurobiology  neurology  neuroscience  Neutrality  News  Newsfeed  newspaper  newspapers  Niedriglohn  Niedriglohnsektor  No  noise  Nordstrom  norms  NSA  Nuremberg  Nürnberger  objectification  OECD  Oettinger  of  offline  Ofsted  okcupid  old  on  on-demand  One  online  onlinebanking  onlinevideo  OOTD  open  open-university  opensource  Opportunism  opportunist  organised  Orwellian  Osborne  output  outsourcing  oversight  pageviews  Pao  Paparazzi  paradox  parenthood  parenting  parents  Parker  party  password  passwords  patent  patience  Patriarchy  pay  payments  PayPal  Peak  Pentagon  Periscope  persistence  Persona  personal  personality  Perspective  peterthiel  philosophy  phishing  phone  Pinterest  PISA  planning  Platform  play  Plenty  plentyoffish  PoF  Police  policing  policy  political  politicalscience  Politicians  politics  pollution  poor  porn  post-racial  Postmates  poverty  power  PR  practical  Precariat  precarious  prejudice  presidency  press  pricing  Primark  printing  Privacy  Privatisation  privilege  Privileged  Procrastinating  procrastination  product  productivity  products  Professional  Profile  profiling  profit  programmers  Programming  progress  Protection  protectionism  Protocol  Psychiatry  psychology  public  pure  Purpose  Qualification  quantified  quantum  racism  Rakuten  rape  rating  Raya  re-training  Reaktionismus  Reality  Reddit  reference  regulation  regulators  relations  relationship  relationships  Rent  Representation  research  resources  responsibility  retail  retention  retraining  revenge  reviews  Revolution  right  rights  Ring  rippers  Robotics  role  round  Rubio  running  Runway  Russia  S3  SAAS  safety  Sainsbury  sale  Salesforce  San  scale  scaling  scam  scandal  Scene  Schnelllebigkeit  School  Schule  science  search  Secret  Sector  security  Selbstdarstellung  Selbstfürsorge  self  self-awareness  self-censorship  self-driving  self-employment  self-esteem  self-governance  self-improvement  self-regulation  self-worth  Selfie  SEO  Service  services  set  sexism  sexismus  sexting  sexual  sexualität  shame  shaming  Share  shareholder  sharing  shirts  shitstorm  shoes  shop  shopping  shops  short-term  showroom  showrooming  Signal  Silicon  skill  skills  slut  Smart  SMB  SME  Smith  snacking  Snapchat  Snappening  Snowden  social  socialmedia  society  socioeconomic  sociology  software  Sony  Soziale  Sozialer  span  spectacles  speech  Spencer  Spideroak  spoof  spoofing  Spotted  Springform  Square  squeezed  stalking  Start-Up  Stasi  state  stats  status  STEM  stereotype  stigma  storage  store  straight  strategy  streaming  Street  Stripe  structural  student  studentdebt  StudentLoans  study  Stuxnet  style  subculture  subhuman  subscription  subsidies  subsidizing  substance  Success  superficial  surveillance  survey  symbol  System  table  Tabloid  tailored  tax  teaching  technology  television  Terror  Tesco  the  TheFappening  theory  thinking  threat  ThreatExchange  threats  time  Tinder  TMZ  to  Toff  too  tools  Tories  Torture  TOS  Trade  tradesy  Trading  tragedy  Trainee  training  transparency  transphobia  Transphobic  transportation  trends  Trichter  trickle-down  Trojan  Trojaner  troll  trolls  Tumblr  Turbo-Abi  tv  twitter  two  two-factor  Uber  Udacity  UI  UK  un-college  underemployed  underinvestment  unemployment  Unicorn  Union  Universal  university  Unrechtsstaat  urban  urbanisation  usa  user  UX  Valley  valuation  value  values  VC  Venmo  Venture  verification  vertical  Vessel  victim  video  videos  view  Vine  violence  Visa  vision  visionary  Vlog  Vlogging  vocational  Vorratsdatenspeicherung  vs.  wage  Wall  Wallet  Walmart  war  Warby  Warrant  web  web2.0  welfare  Western  WhatsApp  Whisper  Whistleblower  white  white-collar  Whitney  Wikileaks  Wikipedia  wiretapping  Wissensgesellschaft  Wolfe  women  wordpress  work  worker  Workers  working  world  WoW  xMOOC  Y!  Yahoo  Yahoo!  Yak  ycombinator  Yik  yoga  You  youth  youtube  Zalando  Zappos  Zara  Zeitarbeit  Zero  Zivilgesellschaft  zombie  Zulily  Überfluss 

Copy this bookmark:



description:


tags: