Neutralité Des Plateformes

Total Page:16

File Type:pdf, Size:1020Kb

Neutralité Des Plateformes Neutralité des plateformes Réunir les conditions d’un environnement numérique ouvert et soutenable Mai 2014 Rapport du Conseil national du numérique sur la neutralité des plateformes remis au ministre de l’Économie, du Redressement productif et du Numérique et à la secrétaire d’État chargée du Numérique 2 Sommaire Avis ........................................................................................................................... 5 Volet I - Renforcer l’effectivité des droits sur les plateformes numériques ....... 11 Volet II - Garantir la loyauté du système des données ......................................... 13 Volet III - Pas de compétitivité sans un investissement massif dans les compétences et les connaissances ........................................ 17 Volet IV - Créer les conditions pour l’émergence d’alternatives ......................... 19 Annexes .................................................................................................................... 23 Fiches thématiques .................................................................................................. 25 Fiche 1 – Les ressources du droit au service de la neutralité ............................. 27 Fiche 2 – La loyauté et la soutenabilité du système des données ...................... 33 Fiche 3 – La neutralité positive : réunir les conditions d’un Internet ouvert ......... 43 Rapport d’analyse sur les écosystèmes de plateformes ..................................... 49 Lettre de saisine ...................................................................................................... 109 Liste des personnalités auditionnées ...................................................................... 111 Membres du groupe de travail ................................................................................. 117 3 4 Avis n°2014-2 du Conseil national du numérique sur la neutralité des plateformes 5 6 Par lettre du 3 juillet 2013, le Ministre de l’Économie et des Finances, le Ministre du Redressement productif et la Ministre déléguée en charge de l’Innovation, des Petites et Moyennes entreprises et de l’Économie numérique ont saisi le Conseil national du numérique (CNNum) sur deux questions : l'une portant sur la procédure conduite auprès de la Commission européenne à propos de Google ; l'autre concernant la poursuite de la réflexion entreprise par le CNNum sur la neutralité des plateformes. Une concertation a été conduite de juillet à novembre 2013 par un groupe de travail composé de dix membres du Conseil. Elle a été organisée sous la forme de quatre vendredis contributifs, Préambule temps d’échange et de travail entre les membres du groupe de réflexion du Conseil et des personnalités extérieures reconnues pour leurs compétences ou leur implication sur le sujet. En parallèle, une série de consultations a été menée pour recueillir l’analyse d’économistes, de juristes et de praticiens du Web. L’avis et les documents qui l’accompagnent sont d’abord le fruit de ces sessions riches, qui ont impliqué toute la diversité des parties prenantes et regroupé plus d’une centaine de participants : représentants d’autorités publiques, représentants de grandes plateformes d’Internet, entreprises plaignantes dans la procédure relative à Google, groupements professionnels, entrepreneurs, avocats, chercheurs, etc. Vu le travail réalisé par le groupe Plateformes du Conseil, piloté par Francis Jutand, membre du Conseil et composé de Benoît Thieulin, Président du Conseil, Serge Abiteboul, Nathalie Andrieux, Pascal Daloz, Nathalie Pujo, Lara Rouyrès, Nathalie Sonnac, Marc Tessier, membres du Conseil ; Jean-Baptiste Soufron, Secrétaire général, Yann Bonnet, Rapporteur général, Judith Herzog, Rapporteur adjoint, Charly Berthet, Rapporteur adjoint, avec l’aide de l’ensemble du Secrétariat général, le Conseil émet aujourd’hui un avis sur la neutralité des plateformes afin d’éclairer le gouvernement dans sa prise de décision. Les préconisations élaborées par le CNNum proposent de répondre à la saisine à différents horizons d’action et de réflexion. À court terme, rendre effectif le principe de neutralité en utilisant les ressources du droit autant que celles propres aux dynamiques numériques. À moyen terme, organiser et réguler le système des données. À long terme, se doter des moyens de préparer l’avenir en termes de compétences, de connaissances, de créativité, d’innovation et d’expérimentation pour rester compétitif et garantir les éléments de notre souveraineté collective et individuelle. Le Conseil n’a pas vocation à se substituer aux prérogatives des autorités compétentes ni à s’immiscer dans des échanges relevant de la vie des affaires. Mais son collège entend, par les conclusions et recommandations de cet avis, participer au débat sur la préservation de conditions équitables pour les écosystèmes concernés. En conséquence, le Conseil a décidé d’inscrire les préoccupations relatives à Google au sein des considérations relatives à l’ensemble des plateformes. Celles-ci nourrissent quatre champs d’action prioritaires visant à réunir les conditions d’une garantie du principe de neutralité dans les écosystèmes de plateformes. Elles sont, pour le Conseil, un paramètre essentiel de la soutenabilité du modèle de développement de la société et de l’économie avec le numérique. En complément de ces préconisations, le Conseil publie des fiches thématiques qui approfondissent certaines pistes de réflexion émanant du cours des travaux ; un rapport d’analyse, rédigé par Olivier Le Gall, Inspecteur des Finances et réalisé à partir du travail du CNNum et des nombreuses auditions et réunions ; et la restitution de l’ensemble de la concertation. 7 Avis n°2014-2 du Conseil national du numérique Étant entendu que, Dès son premier avis (n°2013-1), le Conseil national du numérique a considéré la neutralité d’Internet comme un pilier pour l’exercice effectif de la liberté de communication et de la liberté d’entreprendre au XXIe siècle. À cette fin, les réseaux de communication ouverts au public sont considérés comme des infrastructures dont le rôle est essentiel, puisque la non- discrimination des informations qu’ils transmettent permet à chacun d’en être un consommateur autant qu’un contributeur. Le Conseil relevait à cette occasion que la société numérique n’est pas seulement mise en action par des réseaux physiques mais aussi par un ensemble de services, parmi lesquels les plateformes occupent une place centrale. En organisant la mise en relation entre offre et demande, les plateformes participent au développement du commerce et de l’économie. Elles se construisent pour la plupart autour d’une fonction d’usage massivement utilisée par les utilisateurs et deviennent ensuite un espace de rencontre entre une offre de produit ou de service et des clients potentiels. Apple, Amazon, Expedia, Facebook, Google, Microsoft, Netflix, Twitter, Yahoo!… proposent ainsi des espaces numériques d’intermédiation qui s’accompagnent de fonctionnalités de grande valeur. Elles donnent lieu à la création de nouveaux métiers et chaînes de valeur. Elles favorisent en outre l’innovation, directement ou par l’utilisation de leurs revenus en finançant ou en acquérant des entreprises innovantes. Cette fonction de mise en relation offre aussi un support aux différentes formes d’interactions sociales entre les individus. Les opportunités sont d’autant plus larges que ces sociabilités évoluent, se sophistiquent et parfois s’enrichissent avec le développement de la société numérique : échanger des biens et des services, partager des informations et des connaissances, se fédérer et se mobiliser autour de projets, collaborer et créer, débattre et interpeller des décideurs, etc. Les plateformes de services ont suivi une évolution différente des réseaux de communication, en ne connaissant pas l’étape des monopoles nationaux : le faible niveau d’investissement initial nécessaire a permis la constitution rapide de plateformes dominantes, sur des fonctions d'usage propices aux effets de réseau. Un pouvoir qui se maintient tant que cette émergence n’est pas contrariée politiquement ou industriellement. Parce qu’ils sont des vecteurs du développement du commerce, des catalyseurs d’innovation, qu’ils impulsent les interactions sociales dans la société numérique et compte tenu de leur puissance, le Conseil considère que ces acteurs ont un rôle crucial pour atteindre les objectifs de la neutralité d’Internet. En tant qu’intermédiaires, les plateformes peuvent mettre en relation, mais aussi s’interposer et parfois devenir les concurrentes de leurs propres clients. La position d’intermédiaire constitue un avantage concurrentiel de taille pour les plateformes : elle leur permet de collecter à cette occasion un grand nombre d’informations sur les relations entre les deux faces du marché et construisent une connaissance fine sur la consommation et les usages. 8 Cette configuration peut s’avérer problématique lorsque ces entreprises clientes sont entre- temps devenues dépendantes de la plateforme. Après avoir créé de la valeur en rassemblant les usagers autour d’elles par des services d’accès (recherche d’informations, d’offres, mail, vidéo, etc.), et assuré leur monétisation – directe ou indirecte – en valorisant ces espaces de forte visibilité auprès des professionnels (référencement, régies), l’entrée dans cette troisième phase de développement est à l’origine de contestations, plaintes ou autres actions publiques, comme ce fut observé dans la grande distribution, les télécoms ou aujourd’hui avec le cas de
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Bbg), 2011-2015
    Description of document: FOIA Logs for the Broadcasting Board of Governors (BBG), 2011-2015 Requested date: 02-March-2016 Released date: 06-May-2016 Posted date: 08-August-2016 Source of document: BBG FOIA Office Room 3349 330 Independence Ave. SW Washington, D.C. 20237 Fax: (202) 203-4585 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Broadcasting 330 Independence Ave.SW T 202.203.4550 Board of Cohen Building, Room 3349 F 202.203.4585 Governors Washington, DC 20237 Office ofthe General Counsel Freedom ofInformation and Privacy Act Office May6, 2016 RE: Request Pursuant to the Freedom of Information Act-FOIA #16-035 This letter is in response to your Freedom of Information Act (FOIA) request dated March 2, 2016 to the Broadcasting Board of Governors (BBG), which the Agency received on March 14, 2016.
    [Show full text]
  • D1.1 Somedi Vision
    D1.1 SoMeDi Vision D1.1 SoMeDi Vision WP1 Vision, architecture and data integration – T1.1 SoMeDi Vision and context Delivery Date: Project Number: Responsible partner: M3 - 28/02/2017 ITEA3 Call2 15011 1 D1.1 SoMeDi Vision DOCUMENT CONTRIBUTORS Name Company Email Elena Muelas HIB [email protected] Inmaculada Luengo HIB [email protected] Carlos A Iglesias UPM George Suciu BEIA [email protected] Cristina Ivan Siveco ROMANIA [email protected] Mirela Ardelean Siveco ROMANIA [email protected] Dragos Papatoiu Siveco ROMANIA [email protected] Emilio Madueño Innovati [email protected] DOCUMENT HISTORY Version Date Author Description 0.1 16.12.2016 HIB First ToC distribution requesting contributions 0.2 30.12.2016 BEIA Romanian contributions to SotA 0.3 04.01.2016 Innovati Contributions to architecture 0.4 10.01.2017 HIB New version with restructuration of the sections, integration of the different contributions. Also added Beyond SotA contribution to sentiment analysis, Manifesto section and Marketing use case description. 0.5 17.01.2017 UPM Contribution to Dashboards for social media 0.6 18.01.2017 SIVECO, BEIA Romanian contribution 0.7 18.01.2017 HIB Improvement on use cases and SOMEDI Manifesto 0.8 19.01.2017 INNOVATI Contributions to section 2 and 5 0.9 02.02.2017 BEIA, SIVECO Review of contributions 0.10 06.02.2017 Taiger, HIB Contribution to machine learning and big data technologies/Contribution to sentiment 2 D1.1 SoMeDi Vision analysis 0.11 20.02.2017 BEIA, SIVECO Small contribution on section 2 and 6, add references for section 3 AI 1.0 22.02.2017 HIB Final version distributed for review 3 D1.1 SoMeDi Vision TABLE OF CONTENTS 1.
    [Show full text]
  • TECH TOOLS for ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE of CONT ENT S
    TECH TOOLS FOR ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE OF CONT ENT S Tech Tools For Activism 1 An introduction to this booklet 2 2 Securing your email 4 3 Anonymous Blogs and Websites 7 4 Microblogging Beyond Twitter 9 5 Browsing the Internet 11 6 Organising and Networking Online 14 7 Mobile Phone Security and Android Apps 18 8 Publishing and Networking News 21 9 Producing and Publishing Media to the Internet 23 10 Green Computing 25 11 Hiding & Deleting Things on your PC 27 TECH TOOLS FOR ACTIVISM 1. AN INTRODUCTION TO THIS BOOKLET 2. SECURING YOUR EMAIL 3. ANONYMOUS BLOGS AND WEBSITES 4. MICROBLOGGING BEYOND TWITTER 5. BROWSING THE INTERNET 6. ORGANISING AND NETWORKING ONLINE 7. MOBILE PHONE SECURITY AND ANDROID APPS 8. PUBLISHING AND NETWORKING NEWS 9. PRODUCING AND PUBLISHING MEDIA TO THE INTERNET 10. GREEN COMPUTING 11. HIDING & DELETING THINGS ON YOUR PC 1 1. AN INT RODUCT ION T O T HIS BOOKLET T his booklet will help you to: use email securely publish news and upload media anonymously make your web browsing more anonymous and secure use Facebook and Twitter more securely get organised online without relying on corporate social networking sites use encrypted messaging on mobile phones hide stuff on your computer so it can't be found find a more secure and decentralised replacement for Twitter support free software, open licences and decentralised/ federated communication. Why this booklet is important: This booklet provides an introduction to the effective use of technology for activism, with links to step-by-step guides and further information.
    [Show full text]
  • Perlstein2010social Networking.Pdf (1.828Mb)
    The Application of Social Networks to the Marketing of Industrial Products ________________________ A Master’s Thesis Presented to School of Information Design Technology State University of New York Institute of Technology Utica, New York _____________________ In Partial Fulfillment of the Requirements for the Master of Science Degree ________________________ by Roger Perlstein December 2010 Roger C. Perlstein 2010 SUNYIT DEPARTMENT OF INFORMATION DESIGN AND TECHNOLOGY Approved and recommended for acceptance as a thesis in partial fulfillment of the requirements for the degree of Master of Science in Information Design and Technology _____________________________________ DATE ____________________________________________________ Stephen Schneider Thesis Advisor ____________________________________________________ Russell Kahn ____________________________________________________ Kathryn Stam ii Abstract Social networking changes the way people share ideas and communicate. Advantages in portability, reach, and access contribute to acceptance of social networks and the likelihood that they will continue to grow. While these systems were initially used by individuals, they were not as widely employed by businesses. Some firms however are leveraging these tools and integrating social networking into their marketing. Where social networks are used by businesses, they are primarily focused on consumer goods, home and family, electronics and entertainment. Business-to-business applications are not as widely used and some question whether such tools offer significant benefits in such settings. This thesis studies social network marketing for a vehicle lift manufacturer. It addresses viability, strategy and practices for a vehicle maintenance equipment manufacturer. It analyzes data collected from other similar companies to identify best practices for the use of such tools and details the current state of the industry for this market. iii TABLE OF CONTENTS PAGE LIST OF TABLES s, , vi LIST OF FIGURES vi Chapter 1.
    [Show full text]
  • Social Media & Audience Participation in Regard to Television
    The University of Akron IdeaExchange@UAkron The Dr. Gary B. and Pamela S. Williams Honors Honors Research Projects College Spring 2015 Social Media & Audience Participation in Regard to Television Jean Marie McBride The University Of Akron, [email protected] Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/honors_research_projects Part of the Communication Technology and New Media Commons, Social Media Commons, and the Television Commons Recommended Citation McBride, Jean Marie, "Social Media & Audience Participation in Regard to Television" (2015). Honors Research Projects. 120. http://ideaexchange.uakron.edu/honors_research_projects/120 This Honors Research Project is brought to you for free and open access by The Dr. Gary B. and Pamela S. Williams Honors College at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Honors Research Projects by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Social Media & Audience Participation in Regard to Television: Jean McBride 1 Social Media & Audience Participation in Regard to Television: Jean McBride Introduction Social media has been on the rise for years. From Twitter and Facebook, to Pinterest and Instagram, the social media world has grown. Originally, social media was used for teenagers’ enjoyment; however, in recent years broadcasters have jumped on the social media bandwagon, and used social media to “innovatively enhance consumer engagement, traditional marketing campaigns and promotions” (Benedict, 2013, p.1).
    [Show full text]
  • Is Bob Sending Mixed Signals?
    Is Bob Sending Mixed Signals? Michael Schliep Ian Kariniemi Nicholas Hopper University of Minnesota University of Minnesota University of Minnesota [email protected] [email protected] [email protected] ABSTRACT Demand for end-to-end secure messaging has been growing rapidly and companies have responded by releasing applications that imple- ment end-to-end secure messaging protocols. Signal and protocols based on Signal dominate the secure messaging applications. In this work we analyze conversational security properties provided by the Signal Android application against a variety of real world ad- versaries. We identify vulnerabilities that allow the Signal server to learn the contents of attachments, undetectably re-order and drop messages, and add and drop participants from group conversations. We then perform proof-of-concept attacks against the application to demonstrate the practicality of these vulnerabilities, and suggest mitigations that can detect our attacks. The main conclusion of our work is that we need to consider more than confidentiality and integrity of messages when designing future protocols. We also stress that protocols must protect against compromised servers and at a minimum implement a trust but verify model. 1 INTRODUCTION (a) Alice’s view of the conversa-(b) Bob’s view of the conversa- Recently many software developers and companies have been inte- tion. tion. grating end-to-end encrypted messaging protocols into their chat applications. Some applications implement a proprietary protocol, Figure 1: Speaker inconsistency in a conversation. such as Apple iMessage [1]; others, such as Cryptocat [7], imple- ment XMPP OMEMO [17]; but most implement the Signal protocol or a protocol based on Signal, including Open Whisper Systems’ caching.
    [Show full text]
  • The a to Z of Social Media
    FACT SHEET 4 THE A TO Z OF SOCIAL MEDIA A Blogroll: a list of sites displayed in the sidebar of blog, showing which other blogs the blog-owner AddThis: a social bookmarking service that provides reads regularly. a code users can put on their websites so that when people visit that site, they have the option to share BoardReader: a free search engine that allows users via Facebook, Twitter, etc. Its analytics service can to search for keywords only in posts and titles of show you which pages are trending, where people are online forums. interacting with your brand, and what they’re saying about your content on Twitter. Boxee: a social video application that allows users to watch online videos on their TVs and computers. Algorithm: a set of formulas developed for a computer Users can share and watch videos from a variety of to perform a certain function. This is important in the online videos sources for free. social sphere as the algorithms sites like Facebook and Google use are critical for developing content- Bookmarking: allows you to mark something you sharing strategies. found important, enjoyed, or where you left off to continue reading later. Bookmarking is made possible Application Programming Interface (API): a via online services such as Delicious. documented interface that allows one software application to interact with another application. An example of this is the Twitter API. C Avatar: an image or user name that represents a person online within forums and social networks. Chat: refers to any kind of communication over the Internet but traditionally refers to one-to-one communication through a text-based chat application B commonly referred to as instant messaging applications.
    [Show full text]
  • 1. 210830 E2EE Report Paper
    TERRORIST USE OF E2EE: STATE OF PLAY, MISCONCEPTIONS, AND MITIGATION STRATEGIES REPORT 1. Background And Scope 04 2. Methodology 04 Part 1 – Use and Perception of E2EE: Landscape Review 3. Use and Perception of E2EE: Key Findings 05 4. Public Perception of E2EE: User Concerns for Privacy And Security 06 5. Landscape Review: Use of E2EE Across The Internet 13 6. E2EE: Challenges for Content Moderation 23 7. Challenges for Law Enforcement Access 26 8. Policymakers Calls for Access to and Traceability of E2EE 29 9. Key Arguments Against the Creation of Backdoors 39 Part 2 – Assessing Terrorist and Violent Extremist Use of E2EE 10. Terrorist and Violent Extremist Use of E2EE: Key Findings 42 11. Terrorist and Violent Extremist Use of E2EE: Assessment 42 12. Suspected Use of E2EE In Terrorist Attacks And Its Impact on The Encryption Debate 54 13. Monitoring of Encrypted Platforms By Law Enforcement Agencies 56 Part 3 – Strategies for Risk Mitigation 14. Strategies for Risk Mitigation: Key Findings 62 15. Countering Criminal Use of E2EE 63 16. Preventing Criminal Use – EMS Feature Attributes 63 17. Identifying Patterns of Criminal Use – Metadata Analysis 66 18. Disrupting Criminal Use – Technical Tools to Detect Illegal Content 78 19. Going Beyond The Encryption Debate 85 Part 4 – Tech Against Terrorism’s Recommendations for Tech Platforms 20. Recommendation: Mitigating Risks of Terrorist and Violent Extremist Use of EMS 93 21. Recommendation: Taking A Stand For Encryption 99 Annex Annex 1. Encryption Technology 103 Annex 2. Encryption: A Backbone Of Today’s Digital World 108 Annex 3. The Encryption Debate 110 Annex 4.
    [Show full text]
  • Lista Ofrecida Por Mashe De Forobeta. Visita Mi Blog Como Agradecimiento :P Y Pon E Me Gusta En Forobeta!
    Lista ofrecida por mashe de forobeta. Visita mi blog como agradecimiento :P Y pon e Me Gusta en Forobeta! http://mashet.com/ Seguime en Twitter si queres tambien y avisame que sos de Forobeta y voy a evalu ar si te sigo o no.. >>@mashet NO ABUSEN Y SIGAN LOS CONSEJOS DEL THREAD! http://blog.newsarama.com/2009/04/09/supernaturalcrimefightinghasanewname anditssolomonstone/ http://htmlgiant.com/?p=7408 http://mootools.net/blog/2009/04/01/anewnameformootools/ http://freemovement.wordpress.com/2009/02/11/rlctochangename/ http://www.mattheaton.com/?p=14 http://www.webhostingsearch.com/blog/noavailabledomainnames068 http://findportablesolarpower.com/updatesandnews/worldresponsesearthhour2009 / http://www.neuescurriculum.org/nc/?p=12 http://www.ybointeractive.com/blog/2008/09/18/thewrongwaytochooseadomain name/ http://www.marcozehe.de/2008/02/29/easyariatip1usingariarequired/ http://www.universetoday.com/2009/03/16/europesclimatesatellitefailstoleave pad/ http://blogs.sjr.com/editor/index.php/2009/03/27/touchinganerveresponsesto acolumn/ http://blog.privcom.gc.ca/index.php/2008/03/18/yourcreativejuicesrequired/ http://www.taiaiake.com/27 http://www.deadmilkmen.com/2007/08/24/leaveusaloan/ http://www.techgadgets.in/household/2007/06/roboamassagingchairresponsesto yourvoice/ http://blog.swishzone.com/?p=1095 http://www.lorenzogil.com/blog/2009/01/18/mappinginheritancetoardbmswithst ormandlazrdelegates/ http://www.venganza.org/about/openletter/responses/ http://www.middleclassforum.org/?p=405 http://flavio.castelli.name/qjson_qt_json_library http://www.razorit.com/designers_central/howtochooseadomainnameforapree
    [Show full text]
  • Contagious Is Ten
    Social Change / xxx Contagious is ten. Welcome... 14 28 31 47 THE CONTAGIOUS DECADE SMALL BUT PERFECTLY FORMED 06 A Primer 40 Little brands, big thinkers Log off, lean in and pore over Katrina Dodd’s attempt In each of our past 20 issues, Contagious has at imposing neatly alphabetised order on the chaos of celebrated seven small companies hoping to change the Contagious zeitgeist. the world. We take a look at some of our favourites – and add a few more to the ranks. WELCOME TO CONTAGIOUS X 14 Brands for the next decade STRENGTH STUDY / Publishing Application instructions for this special dose of the 47 By Chloe Markowicz magazine. Side effects may include broad inspiration, Landscape Brands evolve from being publicists brand bravery and a healthy dose of disdain for the to publishers status quo. Brand Spotlight Red Bull Opinion Tyler Brûlé, editor in chief, Monocle STRENGTH STUDY / Disruption 19 By Emily Hare STRENGTH STUDY / Data Landscape How can brands make disruption work 57 By Chris Barth while protecting themselves against challengers? Landscape The fine art of surfacing signal from noise Brand Spotlight Tesla Brand Spotlight IBM Opinion Jonathan Mildenhall, CMO, Airbnb Opinion Vikram Somaya, general manager of WeatherFX, The Weather Company 28 CUT OUT AND KEEP A brief history of (Contagious) time / FEATURE / The technology boneyard The ten commandments 66 Explosive digital development has its casualties. Will A crunched-down illustration of the major tech, social Sansom considers those that became cautionary tales. and business developments on one side and Contagious’ non-denominational lessons to live by on the other.
    [Show full text]
  • Social Media E-Book
    E-Book This e-book and workbook are provided by the Kutztown University Small Business Development Center. Last update: January 18, 2015 For comments and inquiries, please contact: Main center Kutztown University Small Business Development Center 1-877-472-7232 15155 Kutztown Road Kutztown, PA 19530 [email protected] Outreach offices Exton outreach office 737 Constitution Drive www.kutztownsbdc.org Exton, PA 19341 Harrisburg outreach office @KutztownSBDC 3211 North Front Street Harrisburg, PA 17110 www.youtube.com/KUSBDCtv Lancaster outreach office 100 South Queen Street Lancaster, PA 17608 Reading outreach office 237 Court Street Reading, PA 19601 York outreach office 600 North Hartley Street York, PA 17404 An accredited affiliate of the national network of Small Business Development Centers. Copyright © 2015 Kutztown University Small Business Development Center. All Rights Reserved. E-Book The contents of these pages are provided as an information guide only. No legal liability or other responsibility is accepted by or on behalf of the Kutztown University Small Business Development Center for any errors, omissions, or statements on these pages, or any site to which these pages connect. The Kutztown University Small Business Development Center accepts no responsibility for any loss, damage or inconvenience caused as a result of reliance on such information. This guide is provided by the KU SBDC and all sample business stories within are fictional. Any similarity to real businesses is coincidental. Funding support and resources are provided by the Commonwealth of Pennsylvania through the Department of Community and Economic Development; through a cooperative agreement with the U.S. Small Business Administration, and through support from Kutztown University.
    [Show full text]