asterisk2a + cloudstorage   16

The tech industry has cut a Google’s worth of jobs in the past 12 months
bigger companies, more profitable products, with less people. // “It would be wrong to assume that increased job cuts are a sign of weakness in the tech sector,” Challenger, Gray & Christmas CEO John Challenger said in a statement. “The simple fact is that the industry is going through a transformation and companies either have to shift their focus or risk extinction. We will always need technology, but how we interact with it, as well as where and when we interact with it, are changing rapidly.” //&! http://recode.net/2016/04/19/intel-chipmaker-mobile-earnings-restructuring/ - Intel missed the mobile revolution. Now it faces its day of reckoning.
Silicon  Valley  Unicorn  Instagram  WhatsApp  productivity  Software  Eats  The  World  Software  Is  Eating  The  World  Software  Revolution  Software  Development  Slack  Facebook  profit  maximisation  profit  maximization  winner  take  all  IBM  Intel  Microsoft  Salesforce  antitrust  overhead  cost  center  AWS  cloudcomputing  Cloudstorage  Netflix  Amazon  Azure  Google  Cloud  Google  Inc.  Alphabet  Inc.  Oracle  Mobile  Creative  scalability  scaling  scale  Snapchat  Twitter  Apple  automation  robotics  AI  artificial  intelligence  3D  printing  autonomous  cars  self-driving  cars  labour  market  job  market  skill  gap  skills  gap  homescreen 
april 2016 by asterisk2a
[PREMONEY 2014] Venture-nomics: The Explosion Of Micro-Funds & The LP Fatigue Epidemic - YouTube
(1) fundy changes, how little it costs to get sw product/company off the ground. [...] (X) Private Market keeps lots of value creation to itself, much longer time to IPO & Wall Street' short-term demands. // // see also other [PREMONEY 2014] videos on this channel
Venture  Capital  2014  2015  Open  Source  cloudcomputing  Cloudstorage  SPV  Angel  Investor  Seed  Round  Crowd  Funding  Private  Market  Wall  Street 
april 2015 by asterisk2a
Former Homeland Security head tells Pando why he doesn’t trust his fitness data to the cloud | PandoDaily
“One shouldn’t default to the position that connecting everything is perfect.” Chertoff tells Pando he also applies a kind of digital “Washington Post test” to his activities that require him to allow any of his data to be captured by a product or service. (That’s a reference to the litmus test among politicians of a certain vintage, weighing whether they’d be ok with the Washington Post finding out and printing a particular thing they’ve done or said.) All of us, Chertoff says, should treat our data online with the same degree of care with which we guard our reputation. [...] [ book “Terms of Service"] [...] It also wasn’t that long ago that Apple had a major security breach with iCloud. You can’t change your fingerprint. But the safest way to guard sensitive information is not to collect it in the first place. [ everything in the cloud is at risk. period, private data that can, if stole, put your well-being at risk, should not be there without merit/reason.]
Internet  Privacy  Privacy  Cloudstorage  IT  Security  cyber  online  password  Public  Life  Twitter  Facebook  self-censorship  quantified  self  IoT 
april 2015 by asterisk2a
Box CEO Aaron Levie Talks IPO Delay And Growth Strategies | TechCrunch
He pointed to the recent Enterprise Key Management (EKM) announcement, which enables customers to control their own encryption keys. That takes Box out of the equation, which is just where any cloud company wants to be. If government or law enforcement comes knocking, Box can legitimately tell them they can’t share the company’s content because they can’t unlock the encryption. That move alone opened up whole new markets for Box, and it wasn’t a coincidence it announced a financial vertical package just a couple of weeks later. Financial services was a prime market they could attack armed with this type of functionality. [...] By tying Box’s destiny to ECM, he was moving into far more sophisticated enterprise software territory where companies needed a range of services including security, governance, workflow, metadata libraries and so forth.
Cloudstorage  Box  encryption  IPO  Aaron  Levie  differentiation  differentiate  productivity  Google  Drive  Google  for  Business  Dropbox  Microsoft  Google  Amazon 
march 2015 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/ "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Tone deaf Mt. Gox CEO Mark Karpeles warns the world about the dangers of hackers | PandoDaily
"Recent events show that with appropriate motivation anything can be hacked.Maybe everyone should stop and think about what it means for them" - Karpeles tweet would appear to be a reference to the recent celebrity hacking scandal which has seen nude photos of several female stars published online, with extortion request sent to prevent the release of others. (Ironically, many of these demands were for payment in bitcoin.) Even if it weren’t for Karpeles’ track record with alleged hacking attacks, the tweet would nevertheless have been ill-advised. As many other public figures have learned, any hint at victim-blaming in this instance is sure to draw criticism. Combine this with the fact that Karpeles’ nearly bankrupted thousands of people, and this comment warrants a special kind of outrage.
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
Apple - Press Info - Re: Celebgate / The Fappening / 4Chan / AnonIB / iCloud rippers / n00d Celeb Trading Ring
bit.ly/1uvDa0P "This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. [&] iCloud rippers" || From the Statement: "To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification." + @SwiftOnSecurity "Celebrity photo leak being result of an amalgam of targeted attacks instead of 1 iCloud vulnerability explains inconsistent data and leaks." + @pmarca "Subtext for iCloud hacks: "Security questions" are a bad idea -- too easily guessed, particularly for public figures. Known problem!" + @cdixon "Services that repeatedly ask for passwords on mobile devices encourage weak passwords." + bit.ly/1q86n2z - "I’m talking about the fact that people won’t feel the same way about their phones after this." + anon-ib.com down as of recently + bit.ly/1vKzfks "Apple is now attempting to distance its service from any fault in the hacks." + bit.ly/1rhC9Ky + bit.ly/W7V3H2
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
BBC News - FBI investigates 'Cloud' celebrity picture leaks
Posting of celebrity nude pictures leads to FBI investigation - bbc.in/1nSuXzy +++ FBI probes celebrity photo leaks - bbc.in/1A1UtIo +++ bit.ly/1w34y7C +++ bit.ly/1sWQKJE +++ on.wsj.com/1A0YJrA >> 'If people were no complete script kiddies/amateurs, there will be no forensic trail and no real clear picture of how those pictures got stolen from peoples iCloud and other Cloud Services.' +++ News Corp.'s BSkyB Sky News - youtu.be/2AuRvgOpoYQ +++ bbc.in/1nw4iJ9 - "getting people to use passwords this long [14 chars] is a challenge. "It would be nice if we could get most of the population at least as far as eight characters," +++ bbc.in/1qXX1m2 "celebrities had weak passwords [+] brute force attack [...] We now need to hear from Apple on whether its engineers think that theory holds water. The other key question that needs answering, says Ferguson, is how the hackers obtained the email addresses they would have needed to gain access to the victims' accounts."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter 
september 2014 by asterisk2a
Here’s What We Know So Far About The Celebrity Photo Hack | TechCrunch
bit.ly/1CjSrHz ++ bzfd.it/1vBoAsk ++ bzfd.it/1rJ6ALQ ++ bzfd.it/1pyhUsH - "@ThatSusanBurke You know what's better then leaked nudes? Earning the trust & respect of another human to the point that they share their body with you." ++ "leaker screenshots suggests no mastermind who broke iCloud but a dude named Tristian with too much time on his hands" bit.ly/1qwxjaR & "tl;dr is don't take private photos with an iPhone if you have iCloud on" & "Finding out hard way that "iCloud backup" really means what it says, and deleting from device != deleting from cloud" & "[This attack was not just based on iCloud compromise[/weakness/vulnerability]" & 'Some seem to be from Dropbox and S3 too' & bit.ly/1oytbCY ++ bit.ly/1CjSyCY !!!"non-expert user"!!! ++ bit.ly/1tSYuPn ++ #Consent on.fb.me/1w17jGv ++ Pando bit.ly/1lEU25W ++ "n00d Celeb" Trading Ring on AnonIB: ppl trading&helping hack celeb iCloud accounts et al - bit.ly/1uocm2D imgur.com/a/KDAX3 ++ on.recode.net/1A0rNzE - Apple is investigating ++
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  n00d  Celeb  Trading  Ring  AnonIB 
september 2014 by asterisk2a
Box’s updated S-1 contains onerous hidden penalties if the company is late to IPO | PandoDaily
As I’ve written time and again, Box’s destiny is hardly certain at this stage and drawing such rigid lines in the sand could easily come back to burn the company. Levie, it seems, had no other choice than to accept these onerous terms. It’s not altogether uncommon for late stage investors to request downside protection when a company’s performance is in question. Early stage investors do the same by way of liquidation preference and discounted, capped notes. But the very extent of TPG and Coatue’s protections suggest that Box was in a particularly bad negotiating position. With just eight months of runway left when filing its S-1 in March, this is indeed the case. [...] +++ insert price war from Google and Amazon. Rackspace not able to compete with companies that can feed Zero Margin Offerings through cashcows (AdSense) - http://youtu.be/8uMEjg9vVQA / Or the other way around; VC firms buying into an IPO for 2-3x return and the name of the company on its homepage http://bit.ly/1jpyZTm
Box.com  Box  IPO  S-1  Venture  Capital  hunt  for  yield  late-stage  funding  growth  round  Why  Software  Is  Eating  the  World  Software  Is  Eating  World  SAAS  Cloudstorage  cloudcomputing  Amazon  Google  Rackspace  multi-product  company 
july 2014 by asterisk2a
Aaron Levie of Box - TWiST #224 - YouTube
min 35:40 - Freemium in the business space is even cooler than in the consumer space. min 39 - Marc Andreessen "how much do you need to win in this space? how fast do you need to grow, to win." [cost of customer acquisition (freemium, and or Bounty Model from Paypal) and retention]. and define what is winning, what scenario? what measure? ... key accounts long-term commitment? ad spend from key accounts? customer happiness - retention? resellers, dominating sales channels to a vertical of business type and SME/SMB's? min 53 - new playbook is now Get Big, then turn on revenue. disrupt the ecosystem/existing business model, winner takes all. min 54 - how you go from a small shop with profit to raising $+100m round telling than that they get multiples back in their investment, that comes when you live a time here in Palo Alto/Silicon Valley. (crunchbase.com/organization/box) + follow-up "having a playbook." + war for talent: 1 disenfranchised 2 ppl wnt 2 create value, 3 business model
freemium  business  model  Box.net  Dropbox  Google  Docs  Google  Drive  Microsoft  Enterprise  Consumer  friction  frictionless  Evernote  Slack  Gmail  Marc  Andreessen  Venture  Capital  Flickr  Yammer  enterprise2.0  Enterprise  2.0  Bounty  Paypal  SAAS  Why  Software  Is  Eating  the  World  Software  Is  Eating  World  Silicon  Valley  Salesforce  value  creation  added  value  war  for  talent  Top  war-for-talent  Cloudstorage  paradgimshift  paradgim  paradigm  shift  Google  Jive  Software  Jive  Netflix  cloudcomputing  Zappos 
may 2014 by asterisk2a
Dropbox Buys Bubbli, Will Integrate The 3D Photo Tech Into Its Photo Service | TechCrunch
DropBox turining itself into a data platform with all the imaginary auxillary apps and services you can think of. Being your storage place for everything and the gateways are apps, services and software. .... SMART. Very SMART. Documents. Pictures. ... Video and Audio Files next. Blogging Style Public documents w comments ... would be quiet a stretch but not impossible. ... >> Dropbox acquires Bubbli (iOS), a startup that built tech for people to capture 360° views w/ their phones; will integrate tech w/ @dropbox; raised $2M from August Capital - Link
friction  Platform  Open  Platform  Dropbox  Cloudstorage  googledocs  googledrive  Google  Drive  Microsoft  Google  Flickr  Picasa  Facebook  Instagram  Twitter  Vine  YouTube  Soundcloud  acquisitions  acquisition  acquihire  acqui-hire  customer  acquisition  freemium  business  model  publishing  2.0  publishing  Wordpress 
may 2014 by asterisk2a
Lenovo to buy IBM's low-end server unit for $2.3 billion | Reuters
It would not be easy for Lenovo turn around the server unit, however. IBM's low-margin server business has posted seven quarters of losses as clients move to the cloud. "To generate costs synergy, Lenovo will need to move most of the manufacturing from IBM's existing facility in Virginia to Asia while keeping some R&D in the U.S.," Lau said. The server business being sold by IBM, which produced low-cost x86 servers, competes with Hewlett-Packard Co and Dell but lags both in market share. + http://www.bloomberg.com/news/2014-01-23/lenovo-to-buy-ibm-server-unit-for-2-3-billion-amid-pc-slump.html "[S]egment’s gross margin -- the percentage of sales remaining after taking out production costs -- also is getting squeezed. It fell 3.5 percentage points to 36 percent last year. That compares with an 89 percent margin for its software business."
IBM  Lenovo  Cloudstorage  cloudcomputing  margin  commoditization  commodity  business  SaaS  Service  Industry  Enterprise  Services  IT  Industry 
february 2014 by asterisk2a

related tags

2.0  3D  4chan  Aaron  acqui-hire  acquihire  acquisition  acquisitions  added  advice  AI  all  Alphabet  Amazon  Andreessen  Angel  AnonIB  antitrust  Apple  artificial  attack  authentication  automation  autonomous  AWS  Azure  BaaS  Bezos  Big  Blue  Bounty  Box  Box.com  Box.net  brute  business  Capital  cars  cashcow  Celeb  Celebgate  Celebrity  censorship  center  CEO  cloud  cloudcomputing  Cloudstorage  commodities  commoditization  commodity  company  conglomerate  consent  Consumer  copyright  corporate  cost  creation  Creative  crime  Crowd  culture  customer  cyber  cyberespionage  Data  DAU  DBaaS  Development  differentiate  differentiation  disrupting  disruption  Docs  Dotcom  Drive  Dropbox  e-commerce  Eating  Eats  EC2  Edward  efficiencies  encryption  engineering  Enterprise  enterprise2.0  entrepeneurship  entrepreneur  entrepreneurial  entrepreneurship  espionage  Evernote  Facebook  factor  FBI  Flickr  for  force  freemium  friction  frictionless  funding  gap  Gmail  Google  googledocs  googledrive  gossip  growth  Hacking  Hollywood  homescreen  hunt  IBM  iCloud  imgur  Inc.  Industry  inefficiencies  infringement  innovation  innovator  Instagram  integrity  Intel  intelligence  internet  Investor  IoT  IPO  Is  IT  Jeff  Jive  job  Kim  Kindle  labour  late-stage  leak  Lenovo  lesson  Levie  Life  Lobby  Lobbying  lobbyist  management  Marc  margin  market  marketplace  markets  maximisation  maximization  media  Microsoft  Mobile  model  MPAA  multi-product  Music  n00d  Netflix  NSA  objectification  Ocean  of  online  Open  Oracle  Orwellian  overhead  PaaS  paradgim  paradgimshift  paradigm  password  passwords  Paypal  people  phishing  Picasa  Piracy  Platform  printing  Privacy  Private  product  productivity  profit  project  Public  publishing  quantified  Rackspace  Reddit  Revolution  Ring  rippers  robotics  round  S-1  S3  SAAS  SaaS  Salesforce  scalability  scale  scaling  scam  Schmitz  security  Seed  self  self-censorship  self-driving  Service  Services  Sexual  shift  Silicon  skill  skills  Slack  Snapchat  Snowden  Social  Software  SOPA  Soundcloud  Source  specialization  SPV  Start-Up  state  Street  surveillance  take  talent  the  TheFappening  Top  Trading  Twitter  two  Unicorn  Valley  value  Venture  verification  vertical  Vine  Wall  war  war-for-talent  WhatsApp  Whistleblower  Why  winner  Wordpress  World  Yahoo!  Yammer  yield  You  YouTube  Zappos 

Copy this bookmark:



description:


tags: