article thumbnail

Virtual social network IMVU raises $35M from China’s NetEase and others

TechCrunch

The line between social networking and gaming is increasingly blurring , and internet incumbents are taking notice. NetEase, the second-largest gaming company in China (behind Tencent), is among a group of investors who just backed IMVU, an avatar-focused social network operating out of California.

article thumbnail

6 cybersecurity trends we’re thankful for

The Parallax

And social media and other personal-data sources can be used to profile and manipulate people, including voters.As Even “tough” passwords can be hacked, or the account recovery protocol can be exploited and social-engineered away from the account owner. election security experts grab the attention of influencers in D.C.

Trends 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rising Tide Rents and Robber Baron Rents

O'Reilly Media - Ideas

Even social media started with the promise of information triage: for each person, a unique feed of updates from only the friends they had chosen to follow. In the early idealistic days of internet expansion, the leading companies earned outsized profits by solving the attention allocation problem. The market was maturing.

article thumbnail

ChatGPT, Author of The Quixote

O'Reilly Media - Ideas

In “ How Photos of Your Kids Are Powering Surveillance Technology ,” The New York Times reported that One day in 2005, a mother in Evanston, Ill., To zoom out again, we live in a society where mainstream journalism has been carved out and gutted by the internet, search, and social media. joined Flickr.

ChatGPT 122
article thumbnail

Social Networking and Business Value

SoCal CTO

Just a quick note that I'll be moderating a Technology Council Event : Social Networking as a Business Strategy May 19, 2009 - Culver City Social networking media are used on a daily basis to grow businesses and expand career opportunities. Corporations increasingly see social media as a key PR, communications and marketing medium.

Social 60
article thumbnail

Complying With Health Insurance Portability and Accountability Act (HIPAA) Security Rules

CTOvision

HIPAA was enacted in 1996, and by April 2005 security standards were required to be in place for most covered entities. Is Patient Privacy Possible in the Social Age? In 2013 key portions of this law were updated. Related articles. The HIMSS Version of Voter ID Laws (thehealthcareblog.com). community.spiceworks.com). coloradotech.edu).

Insurance 118
article thumbnail

Exceeding the Benefits of Complexity? A Fractal Model for the Social Business Era

Dion Hinchcliffe's Web 2.0 Blog

and SOA is one that I deeply explored in the 2005-2007 timeframe, and my ideas on this even made the cover story of the SOA/Web Services Journal at one point. The problem lies in our classical views of enterprise architecture and business architecture both. A collapse of a monolith, consumed by its own growth and complexity?

Social 65