Dropbox | Nasdaq: DBX Strong Sell Opinion “A Box of Empty Promises”
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Secure Data Sharing in the Cloud
Eivind Nordal Gran Secure data sharing in the cloud Eivind Nordal Gran Eivind Nordal Master’s thesis in Communication Technology Supervisor: Colin Alexander Boyd, Gareth Thomas Davies & Clementine Gritti June 2019 Master’s thesis Master’s Secure data sharing in the cloud data Secure NTNU Engineering Communication Technology Communication Department of Information Security and Department of Information Faculty of Information Technology and Electrical Technology of Information Faculty Norwegian University of Science and Technology of Science University Norwegian Eivind Nordal Gran Secure data sharing in the cloud Master’s thesis in Communication Technology Supervisor: Colin Alexander Boyd, Gareth Thomas Davies & Clementine Gritti June 2019 Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Department of Information Security and Communication Technology Problem description: Data sharing using cloud platforms has become increasingly more popular over the last few years. With the increase in use comes a heightened demand for security and privacy. This project will conduct a thorough study of a key transport proto- col developed at NTNU, which targets strong security as its preeminent property, including a form of forward secrecy. More specifically, it will investigate how this escalation in security level affects the performance and usability of the protocol. How will the new protocol designed with security as its primary concern compare against other already established schemes when it comes to efficiency and practicality? Abstract Cloud sharing security is an important topic in today’s society. The majority of the most common cloud sharing solutions require that the user trust the Cloud Service Provider (CSP) to protect and conceal uploaded data. -
Online Backup & Sync
Online Backup & Sync Access all your Tresorit folders and files securely in your computer’s file browser, regardless of whether you synced it or not. Store & backup your files securely in the cloud Tresorit's end-to-end encrypted online storage solution extends the space on your local drive and protects your files in the cloud. Only you and those who you share with can access the content. • Extend your hard drive: Integrate Tresorit Drive to your local file manager to upload and access files without storing them locally. • Selective sync: Define which subfolders you want to keep synced on your device. Keep control how much space you use on your local drive. • Version recovery: Store and roll back to any previous version of your files. “Tresorit integrates very well into the system. You don't really have to do much about it. It simply works.” - Christian Zeyer, Co-Managing Director at Swisscleantech Upload your existing folder Upload & Sync Recover older versions of structure automatically files Keep the way you organize your Tresorit updates your files in Keep track of changes by your files when you upload them to the real-time and automatically adds collaborators, solve version cloud. No need to change what is any edits you make to the cloud. conflicts and use unlimited file already on your computer. Backup You can access the latest version versioning to roll back to any & Sync only takes a few clicks. of your data from any device. previous version. “After a partner's Dropbox account “Documents we place into Tresorit “Our most sensitive data are the ideas was compromised, switching to appear immediately on the client’s of our clients, so solving version Tresorit couldn't have been simpler laptop. -
Snapchat Dropbox
LOS ANGELES | SAN FRANCISCO | NEW YORK | BOSTON | SEATTLE | MINNEAPOLIS | MILWAUKEE July 15, 2013 Michael Pachter Steve Koenig (213) 688-4474 (415) 274-6801 [email protected] [email protected] PRISM … Progress Report for Internet and Social Media In This Issue: Snapchat, Dropbox Snapchat Developer of the popular photo-messaging app, founded in 2011. Application allows photos to be sent between users. Photos can only be viewed for a few seconds, then self-delete. App has experienced rapid adoption, with 200 million pictures sent per day, up from 150 million in April of this year. Valuation has risen significantly, from approximately $70 million in February 2013 to $800 million today. Founders now in legal battle with a schoolmate claiming to be a third founder. Popularity may represent a cultural shift to less-permanent, more anonymous web services. Dropbox Announced at developer conference its intention to create a data platform for developers. Introduced new tools for deeper application integration. User count rises to 175 million from 100 million in November of last year. About Wedbush Securities Private Shares Group The Private Shares Group of Wedbush Securities is a leader in providing research and trading to the rapidly growing industry of privately traded securities, with an emphasis on companies in the social media space. We assist companies in raising growth capital through traditional private placements and provide liquidity options for existing and former employees through tailored selling programs. We also work with venture capital, private equity and hedge fund investors to help them adjust their holdings in some of the most dynamic companies. -
On the Security of Cloud Storage Services
FRAUNHOFER INSTITUTE FOR SECURE INFORMATION TECHNOLOGY ON THE SECURITY OF CLOUD Sharing of data was a problem for CloudMe, Dropbox, Team- Summary Individuals or companies considering to use cloud STORAGE SERVICES Drive and Wuala. Problems occur if fi les are shared with non- storage services are advised to check whether a cloud provider MANAGEMENT SUMMARY subscribers by a long, unpredictable URL. CloudMe does not meets these security requirements. obfuscate this URL adequately. Dropbox gives an unclear de- scription wrt to sharing details, TeamDrive is weak when disin- In addition, it is worthwhile to consider using more than one viting a group member and Wuala enables information gathe- service to reduce the impacts of service downtime. Further, ring by including the user name in public URLs. CloudMe does calculation of the time to recover all data from the cloud is re- not prevent search engines from accessing the workspace. commended. Depending on the individual amount of data, this may take several days. Having a plan for a provider Deduplication was a problem for Mozy and Wuala, because change in the future reduces the dependancy on a particular in some cases it is possible to ask the cloud storage provider provider (provider lock-in). This will be relevant, for example, if whether a fi le is already stored or not. the chosen provider is getting too expensive or is not longer compliant with governmental rules. As a major result, the stu- Data confi dentiality can be improved by users by encrypting dy shows that most of the analyzed cloud storage providers their data locally before uploading it to the cloud. -
The Rise of China's Silicon Dragon
PwC’s Experience Centre May 2016 The rise of China’s silicon dragon China’s internet players are shifting the centre of gravity in the global digital economy and forcing multinationals to rethink fundamental assumptions about the sources of innovation-led growth Executive Summary When it comes to China the China’s leading digital players now that is characterised by intense numbers are usually big and digital rival their Western counterparts in competition and demanding is no exception. Alibaba holds the terms of overall scale, value and customer expectations. However, world record for the largest opening innovation capability. And while with China as a leading digital day IPO, and Tencent’s WeChat impact outside of the domestic innovator, we are seeing the achieved more mobile transactions market has been limited, we expect emergence of a “China for the over Chinese New Year than PayPal this to change. Internet players World” strategy. Here we see MNCs did in all of 2015. But it’s not just will increasingly become more ideate, test and scale leading- the internet giants that are breaking established and visible on the global edge digital solutions within China records: PwC’s analysis shows that landscape through direct expansion that can then be exported to other Venture Capital (VC) investment into Emerging Market eCommerce, international markets. To do this value in China-based internet social and mobile services; cross- effectively MNCs must confront a businesses was worth USD 20bn border M&A of high-tech firms; range of challenges that include: in 2015, exceeding VC investment exporting disruptive business talent acquisition and retention; in United States-based internet models; and attracting international establishing and maintaining business (USD 16bn) for the very digital talent. -
Save It to the Cloud
Save It To The Cloud Virtual Program – December 2020 What Is The Cloud? To put it simply, there is no cloud. There is just some other computer. The cloud part refers to storing your files somewhere other than your computer’s hard drive and accessing them through the Internet. Cloud storage services are free for a set number of gigabytes, but once you go over that amount, the fees can be costly. Pros & Cons There are many advantages to using cloud storage, including: Usability: able to be used on multiple devices and computers Bandwidth: instead of sending attachments through email, provide a link to the file to avoid size limits Accessibility: provides access to your files anywhere you have a device connected to the Internet Disaster Recovery: provides a copy of your files in case the worst should happen to your device Storage Savings: allows you to move files off your device, saving valuable storage space Of course, there are disadvantages to using cloud storage: Not User Friendly: for those new to the chosen service, it can be a learning curve Limited Accessibility: without an Internet connection, you are stuck Data Security: nothing is ever truly secure on the Internet Software: have to set up the service on all applicable devices 1 The Products We are going to be discussing four cloud storage services today: Google Drive Microsoft OneDrive Apple iCloud Dropbox Here is a quick breakdown of the four services and their features. Google Microsoft Apple Dropbox Drive OneDrive iCloud Apple device Emphasis Collaboration Office apps Compatibility users Free 15 GB 5GB 5 GB 2 GB Storage Online Yes Yes Yes No Editing File Yes Yes Yes Yes Versioning Windows Yes Yes Yes Yes App iOS Yes Yes Yes Yes App Android Yes Yes No Yes App Picked your chosen cloud storage service? Let’s find out how to sign up for it, install it, and use it! 2 Google Drive Step 1: Sign Up To sign up for Google Drive, you must have an account. -
Computer Engineer Ruchi Sanghvi
STEM TRAILBLAZER BIOS COMPUTER ENGINEER RUCHI SANGHVI THIS PAGE LEFT BLANK INTENTIONALLY STEM TRAILBLAZER BIOS COMPUTER ENGINEER RUCHI SANGHVI LAURA HAMILTON WAXMAN Lerner Publications Minneapolis For Caleb, my computer wizard Copyright © 2015 by Lerner Publishing Group, Inc. All rights reserved. International copyright secured. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—without the prior written permission of Lerner Publishing Group, Inc., except for the inclusion of brief quotations in an acknowledged review. Lerner Publications Company A division of Lerner Publishing Group, Inc. 241 First Avenue North Minneapolis, MN 55401 USA For reading levels and more information, look up this title at www.lernerbooks.com. Content Consultant: Robert D. Nowak, PhD, McFarland-Bascom Professor in Engineering, Electrical and Computer Engineering, University of Wisconsin–Madison Library of Congress Cataloging-in-Publication Data Waxman, Laura Hamilton. Computer engineer Ruchi Sanghvi / Laura Hamilton Waxman. pages cm. — (STEM trailblazer bios) Includes index. ISBN 978–1–4677–5794–2 (lib. bdg. : alk. paper) ISBN 978–1–4677–6283–0 (eBook) 1. Sanghvi, Ruchi, 1982–—Juvenile literature. 2. Computer engineers—United States— Biography—Juvenile literature. 3. Women computer engineers—United States—Biography— Juvenile literature. I. Title. QA76.2.S27W39 2015 621.39092—dc23 [B] 2014015878 Manufactured in the United States of America 1 – PC – 12/31/14 The images in this book are used with the permission of: picture alliance/Jan Haas/Newscom, p. 4; © Dinodia Photos/Alamy, p. 5; © Tadek Kurpaski/flickr.com (CC BY 2.0), p. -
One of the Briefs
No. 15-674 IN THE Supreme Court of the United States UNITED STATES OF AMERICA, et al., Petitioners, v. STATE OF TEXAS, et al., Respondents. ON WRIT OF CERTIORARI TO THE UNITED STATES CouRT OF APPEALS FOR THE FIFTH CIRcuIT BRIEF OF AMICI CURIAE MEMBERS OF THE BUSINESS COMMUNITY IN SUPPORT OF PETITIONERS CLIFFORD M. SLOAN BORis BERSHTEYN BRENDAN B. GANTS Counsel of Record SKADDEN, ARPS, SLATE, ESTHER ADZHIASHVILI MEAGHER & FLOM LLP SAM AULD 1440 New York Avenue, NW NicHOLAS J. MOSCOW Washington, DC, 20005 STEFANIE E. NEALE (202) 371-7000 SKADDEN, ARPS, SLATE, [email protected] MEAGHER & FLOM LLP 4 Times Square New York, NY, 10036 (212) 735-3000 [email protected] Counsel for Amici Curiae* (Additional Counsel Listed on Inside Cover) 264548 A (800) 274-3321 • (800) 359-6859 KRisTIN LINSLEY MYLES DAVID A. WILSON MUNGER, TOLLES & OLSON LLP THOMPSON HINE LLP 560 Mission Street 1919 M Street NW, Suite 700 San Francisco, CA 94105 Washington, DC 20036 (415) 512-4022 (202) 263-4161 [email protected] [email protected] Counsel for Amici Curiae Counsel for Amicus Curiae Mark Zuckerberg, Reid Liberty Tax, Inc. Hoffman, Ron Conway, Max Levchin, Aditya Agarwal, Nosheen Hashemi, Rishi Shah and Faquiry Diaz Cala * Skadden, Arps, Slate, Meagher & Flom LLP is counsel to all amici curiae listed in the Appendix to this brief, except as to Liberty Tax, Inc., Mark Zuckerberg, Reid Hoffman, Ron Conway, Max Levchin, Aditya Agarwal, Nosheen Hashemi, Rishi Shah and Faquiry Diaz Cala. i TABLE OF CONTENTS TABLE OF AUTHORITIES ................................... iii INTEREST OF AMICI CURIAE ............................ -
The Future of Work Growthenabler Report 2020
Private & Confidential 2020 The Future of Work GrowthEnabler Report 2020 The growing adoption of digital technologies is fueling a new paradigm - Remote Working.The enormous power of data combined with AI in the workplace has created new business and economic models - On/Off balance sheet talent management. What changes could be in store for the workplace, the workforce, and the nature of work itself? CONFIDENTIAL AND PROPRIETARY This presentation, including any supporting materials, is owned by GrowthEnabler™ and/or its affiliates and is for the sole use of the intended GrowthEnabler™ audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of GrowthEnabler™ or its affiliates. ©2020 GrowthEnabler™ and/or its affiliates. All rights reserved. Private & Confidential An AI-powered digital insights-engine & solution sourcing marketplace GrowthEnabler is an AI powered insights and solutions sourcing platform with strategic advisory arm that enables Global Enterprises to rapidly source digital solutions, and engage new and innovative vendors from the digital economy We create strategic insights on the digital economy and provide real-time analysis on over 500 thousand global digital vendors. Our clients rely on us to save them time and money using AI, to enhance their digital innovation and decision making capabilities. Partner, Invest and Procure. -
Coders-Noten.Indd 1 16-05-19 09:20 1
Noten coders-noten.indd 1 16-05-19 09:20 1. DE SOFTWARE-UPDATE DIE DE WERKELIJKHEID HEEFT VERANDERD 1 Adam Fisher, Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom, (New York: Twelve, 2017), 357. 2 Fisher, Valley of Genius, 361. 3 Dit segment is gebaseerd op een interview van mij met Sanghvi, en op verscheidene boeken, artikelen en video’s over de begindagen van Facebook, waaronder: Daniela Hernandez, ‘Facebook’s First Female Engineer Speaks Out on Tech’s Gender Gap’, Wired, 12 december 2014, https://www.wired.com/2014/12/ruchi-qa/; Mark Zucker berg, ‘Live with the Original News Feed Team’, Facebookvideo, 25:36, 6 september 2016, https://www.facebook.com/zuck/ videos/10103087013971051; David Kirkpatrick, The Facebook Effect: The Inside Story of the Company That Is Connecting the World (New York: Simon & Schuster, 2011); INKtalksDirector, ‘Ruchi Sanghvi: From Facebook to Facing the Unknown’, YouTube, 11:50, 20 maart 2012, https://www.youtube.com/watch?v=64AaXC00bkQ; TechCrunch, ‘TechFellow Awards: Ruchi Sanghvi’, TechCrunch-video, 4:40, 4 maart 2012, https://techcrunch.com/video/techfellow-awards-ruchi- coders-noten.indd 2 16-05-19 09:20 sanghvi/517287387/; FWDus2, ‘Ruchi’s Story’, YouTube, 1:24, 10 mei 2013, https://www.youtube.com/watch?v=i86ibVt1OMM; alle video’s geraadpleegd op 16 augustus 2018. 4 Clare O’Connor, ‘Video: Mark Zucker berg in 2005, Talking Facebook (While Dustin Moskovitz Does a Keg Stand)’, Forbes, 15 augustus 2011, geraadpleegd op 7 oktober 2018, https://www.forbes.com/sites/ clareoconnor/2011/08/15/video-mark-Zucker berg-in-2005-talking- facebook-while-dustin-moskovitz-does-a-keg-stand/#629cb86571a5. -
Two Cheers for Corporate Experimentation: the A/B Illusion and the Virtues of Data-Driven Innovation
MEYER FINAL.DOCX (DO NOT DELETE) 5/7/15 10:47 PM TWO CHEERS FOR CORPORATE EXPERIMENTATION: THE A/B ILLUSION AND THE VIRTUES OF DATA-DRIVEN INNOVATION MICHELLE N. MEYER* INTRODUCTION: TWO FRAMES FOR THINKING ABOUT CORPORATE EXPERIMENTATION ...................................................................................... 274 I. BACKGROUND TO THE FACEBOOK EXPERIMENT ............................................. 279 A. Facebook’s Algorithmic News Feed Practice ............................ 279 B. The Emotional Valence of News Feed Posts .............................. 282 C. Four Hypotheses about the Effects of News Feed .................... 283 D. The Facebook “Emotional Contagion” Experiment ................ 285 II. FRAME ONE: HUMAN SUBJECTS RESEARCH ................................................ 287 A. Subjects Gave No Ethically Meaningful Consent to the Experiment ......................................................................................... 288 B. Why Consent Is Not Always an Ethical Requirement of Human Subjects Research ............................................................ 292 C. Was Informed Consent an Ethical Requirement of the Facebook Experiment? ................................................................... 298 1. Infeasibility ................................................................................... 298 2. Incompletely Informed Consent .......................................... 298 3. Debriefing ...................................................................................... 300 4. Minimal -
A COUNTERFACTUAL ANALYSIS of GOOGLE and FACEBOOK PRIVACY INCIDENTS Ira S
PRIVACY BY DESIGN: A COUNTERFACTUAL ANALYSIS OF GOOGLE AND FACEBOOK PRIVACY INCIDENTS Ira S. Rubinstein † & Nathaniel Good †† ABSTRACT Regulators here and abroad have embraced “privacy by design” as a critical element of their ongoing revision of current privacy laws. The underlying idea is to “build in” privacy— in the form of Fair Information Practices or (“FIPs”)—when creating software products and services. But FIPs are not self-executing. Rather, privacy by design requires the translation of FIPs into engineering and usability principles and practices. The best way to ensure that software includes the broad goals of privacy as described in the FIPs and any related corporate privacy guidelines is by including them in the definition of software “requirements.” And a main component of making a specification or requirement for software design is to make it concrete, specific, and preferably associated with a metric. Equally important is developing software interfaces and other visual elements that are focused around end-user goals, needs, wants, and constraints. This Article offers the first comprehensive analysis of engineering and usability principles specifically relevant to privacy. Based on a review of the technical literature, it derives a small number of relevant principles and illustrates them by reference to ten recent privacy incidents involving Google and Facebook. Part I of this Article analyzes the prerequisites for undertaking a counterfactual analysis of these ten incidents. Part II presents a general review of the design principles relevant to privacy. Part III turns to ten case studies of Google and Facebook privacy incidents, relying on the principles identified in Part II to discover what went wrong and what the two companies might have done differently to avoid privacy violations and consumer harms.