Tech Giants, Artificial Intelligence, and the Future of Journalism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Annual Report 2019 Contents
Annual Report 2019 Contents 4 Foreword 93 Report of the Supervisory Board 6 Executive Board 102 Consolidated Financial Statements 103 Consolidated Statement of 8 The Axel Springer share Financial Position 10 Combined Management Report 105 Consolidated Income Statement 106 Consolidated Statement of 13 Fundamentals of the Axel Springer Group Comprehensive Income 24 Economic Report 107 Consolidated Statement of 44 Economic Position of Axel Springer SE Cash Flows 48 Report on risks and opportunities 108 Consolidated Statement of Changes in Equity 60 Forecast Report 109 Consolidated Segment Report 71 Disclosures and explanatory report on the Executive Board pursuant to takeover law 110 Notes to the Consolidated Financial Statements 77 Corporate Governance Report 180 Responsibility Statement 181 Independent Auditor’s Report 187 Boards 2 Group Key Figures in € millions Change yoy 2019 2018 Group Revenues – 2.2 % 3,112.1 3,180.7 Digital revenue share1) 73.3 % 70.6 % 2) EBITDA, adjusted – 14.5 % 630.6 737.9 EBITDA margin, adjusted2) 20.3 % 23.2 % 2) EBIT, adjusted – 21.5 % 414.5 527.9 EBIT margin, adjusted 2) 13.3 % 16.6 % Net income – 35.4 % 134.6 208.4 2) Net income, adjusted – 21.5 % 263.7 335.7 Segments Revenues Classifieds Media 0.1 % 1,213.8 1,212.5 News Media – 4.4 % 1,430.9 1,496.2 Marketing Media 0.8 % 421.5 418.3 Services/Holding – 14.4 % 46.0 53.7 EBITDA, adjusted2) Classifieds Media – 3.8 % 468.4 487.2 News Media – 39.3 % 138.5 228.2 Marketing Media 20.3 % 107.8 89.6 Services/Holding − – 84.1 – 67.0 EBIT, adjusted2) Classifieds Media – 7.1 % 377.9 406.7 News Media – 54.4 % 72.1 158.2 Marketing Media 26.1 % 83.3 66.0 Services/Holding − – 118.6 – 103.0 Liquidity and financial position 2) Free cash flow (FCF) – 38.1 % 214.6 346.9 2) 3) FCF excl. -
Basics of OS Upgrades
Basics of OS Upgrades Everything you need to prepare for macOS Big Sur and iOS 14 Apple OS upgrades are coming. Are you ready? Exciting new versions of macOS (for Mac), iPadOS (for iPad) and iOS (for iPhone) are heading to a device near you. Your job is simple. Get these features into the hands of users, all without disrupting workflows or slowing productivity. As most organizations know, this can often be easier said than done, especially when factoring in the speed at which Apple users like to upgrade. Now for the good news. At Jamf, we’ve been doing this for more than 17 years, and are here to provide step-by-step guidance for successful Apple upgrades — regardless if it is your first, fifth or 17th OS season. Why an Contrary to other ecosystems, a variety of devices and OS platforms with major new versions of Apple’s a single management solution. Without the Apple operating systems are released complications and cost of licensing, Apple’s annually. A combination of the user-initiated upgrades are easy for end users upgrade is simple upgrade path and $0 to carry out autonomously. This is one of the cost help drive industry-leading reasons Apple’s operating systems have the highest adoption rate of any ecosystem. different adoption rates for consumers. End users are so excited to access the This trend is further accelerated by Apple’s new features; yet, you’re responsible for vertical integration of hardware and software: maintaining security controls and an accurate any new Mac, iPad or iPhone will always systems inventory at all times. -
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC. -
14Annual Report Contents
14Annual Report Contents 4 Foreword 78 Report of the Supervisory Board 6 Executive Board 86 Consolidated Financial Statements 87 Responsibility Statement 8 The Axel Springer share 88 Auditor’s Report 89 Consolidated Statement of Financial Position 10 Combined Management Report 91 Consolidated Statement of 12 Fundamentals of the Axel Springer Group Comprehensive Income 22 Economic report 92 Consolidated Statement of Cash Flows 41 Economic position of Axel Springer SE 93 Consolidated Statement of Changes in Equity 44 Events after the reporting date 94 Consolidated Segment Report 45 Report on risks and opportunities 95 Notes to the Consolidated 56 Forecast report Financial Statements 61 Disclosures and explanatory report of the Executive Board pursuant to takeover law 158 Boards 65 Corporate Governance Report Group Key Figures Continuing operations in € millions Change yoy 2014 2013 2012 Group Total revenues 8.4 % 3,037.9 2,801.4 2,737.3 Digital media revenues share 53.2 % 47.5 % 42.4 % 1) EBITDA 11.6 % 507.1 454.3 498.8 1) EBITDA margin 16.7 % 16.2 % 18.2 % 2) Digital media EBITDA share 72.1 % 62.0 % 49.4 % 3) EBIT 9.7 % 394.6 359.7 413.6 Consolidated net income 31.9 % 235.7 178.6 190.7 3) Consolidated net income, adjusted 9.3 % 251.2 229.8 258.6 Segments Revenues Paid Models 2.6 % 1,561.4 1,521.5 1,582.9 Marketing Models 10.8 % 794.1 716.5 662.8 Classified Ad Models 27.2 % 512.0 402.6 330.2 Services/Holding 6.1 % 170.5 160.8 161.4 EBITDA1) Paid Models – 2.4 % 244.2 250.1 301.8 Marketing Models 6.0 % 109.7 103.4 98.1 Classified Ad Models -
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing As an Interactive Practice
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice Sameer Patil, Greg Norcie, Apu Kapadia Adam J. Lee School of Informatics and Computing Department of Computer Science Indiana University University of Pittsburgh 901 E 10th St 210 S Bouquet St Bloomington, IN 47408 USA Pittsburgh, PA 15260 USA {patil, gnorcie, kapadia}@indiana.edu [email protected] ABSTRACT systems focused on enabling collaborators to locate each Rapid growth in the usage of location-aware mobile phones other (e.g., [25, 36]). Such systems typically required orga- has enabled mainstream adoption of location-sharing ser- nizations to install their own location-mapping infrastruc- vices (LSS). Integration with social-networking services ture, either developed in-house by the organization or pur- (SNS) has further accelerated this trend. To uncover how chased from companies such as Ubisense, which offers a 3D localization infrastructure. To scale globally without such these developments have shaped the evolution of LSS usage, 1 we conducted an online study (N = 362) aimed at under- custom infrastructure, services such as Dodgeball allowed standing the preferences and practices of LSS users in the users to send their current locations as text messages to US. We found that the main motivations for location sharing the service, which then alerted friends if they opportunis- were to connect and coordinate with one's social and pro- tically happened to be near each other. Eventually WiFi fessional circles, to project an interesting image of oneself, and GPS-based localization built into smartphones led to and to receive rewards offered for `checking in.' Respon- the development of various stand-alone location-sharing ser- dents overwhelmingly preferred sharing location only upon vices (LSS) such as Foursquare (https://www.foursquare. -
In the Court of Chancery of the State of Delaware Karen Sbriglio, Firemen’S ) Retirement System of St
EFiled: Aug 06 2021 03:34PM EDT Transaction ID 66784692 Case No. 2018-0307-JRS IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE KAREN SBRIGLIO, FIREMEN’S ) RETIREMENT SYSTEM OF ST. ) LOUIS, CALIFORNIA STATE ) TEACHERS’ RETIREMENT SYSTEM, ) CONSTRUCTION AND GENERAL ) BUILDING LABORERS’ LOCAL NO. ) 79 GENERAL FUND, CITY OF ) BIRMINGHAM RETIREMENT AND ) RELIEF SYSTEM, and LIDIA LEVY, derivatively on behalf of Nominal ) C.A. No. 2018-0307-JRS Defendant FACEBOOK, INC., ) ) Plaintiffs, ) PUBLIC INSPECTION VERSION ) FILED AUGUST 6, 2021 v. ) ) MARK ZUCKERBERG, SHERYL SANDBERG, PEGGY ALFORD, ) ) MARC ANDREESSEN, KENNETH CHENAULT, PETER THIEL, JEFFREY ) ZIENTS, ERSKINE BOWLES, SUSAN ) DESMOND-HELLMANN, REED ) HASTINGS, JAN KOUM, ) KONSTANTINOS PAPAMILTIADIS, ) DAVID FISCHER, MICHAEL ) SCHROEPFER, and DAVID WEHNER ) ) Defendants, ) -and- ) ) FACEBOOK, INC., ) ) Nominal Defendant. ) SECOND AMENDED VERIFIED STOCKHOLDER DERIVATIVE COMPLAINT TABLE OF CONTENTS Page(s) I. SUMMARY OF THE ACTION...................................................................... 5 II. JURISDICTION AND VENUE ....................................................................19 III. PARTIES .......................................................................................................20 A. Plaintiffs ..............................................................................................20 B. Director Defendants ............................................................................26 C. Officer Defendants ..............................................................................28 -
Onderzoeksopzet
'Truth is the first casualty' How does embedded journalism influence the news coverage of TFU in the period 2006-2010? Barbara Werdmuller Master thesis Political Science Campus Den Haag, University of Leiden June 2012 For all soldiers and journalists who risk their lives by fulfilling their private mission in war zones. 2 Word of thanks The author of this research wishes to thank the following persons for their contribution to the realization of this thesis. First, the editors and journalists of the analyzed papers and news magazines for their feedback regarding reporter status and views regarding (non-)embedded journalism. Second, the two supervisors Jan van der Meulen and Frits Meijerink for their constructive feedback and advice with regard to analysis of literature, execution of the research and statistical analysis. Third, Maria Werdmuller for assistance with the import of analyzed data in SPSS. Last but not least, Carlos Vrins and Mark Pijnenburg for their feedback and words of encouragement in the process of research and writing of the thesis. 3 Table of content Summary 6 1 Introduction: 'Truth is the first casualty' 7 1a The phenomenon of embedded journalism 7 1b Research question and structure of the research report 8 2 War journalism and embedded journalism 10 2a The impact of war journalism 10 2b The profession of war journalist 11 2c Developments in war journalism in the 20th and 21th century 13 2d A case of embedded journalism: Iraq 13 2e Overview 15 3 A Dutch case of embedded journalism: Task Force Uruzgan 16 3a The embed -
Intentional Disregard: Trump's Authoritarianism During the COVID
INTENTIONAL DISREGARD Trump’s Authoritarianism During the COVID-19 Pandemic August 2020 This report is dedicated to those who have suffered and lost their lives to the COVID-19 virus and to their loved ones. Acknowledgments This report was co-authored by Sylvia Albert, Keshia Morris Desir, Yosef Getachew, Liz Iacobucci, Beth Rotman, Paul S. Ryan and Becky Timmons. The authors thank the 1.5 million Common Cause supporters whose small-dollar donations fund more than 70% of our annual budget for our nonpartisan work strengthening the people’s voice in our democracy. Thank you to the Common Cause National Governing Board for its leadership and support. We also thank Karen Hobert Flynn for guidance and editing, Aaron Scherb for assistance with content, Melissa Brown Levine for copy editing, Kerstin Vogdes Diehn for design, and Scott Blaine Swenson for editing and strategic communications support. This report is complete as of August 5, 2020. ©2020 Common Cause. Printed in-house. CONTENTS Introduction ............................................................................ 3 President Trump’s ad-lib pandemic response has undermined government institutions and failed to provide states with critically needed medical supplies. .............5 Divider in Chief: Trump’s Politicization of the Pandemic .................................... 9 Trump has amplified special interest-funded “liberate” protests and other “reopen” efforts, directly contradicting public health guidance. ...................9 Trump and his enablers in the Senate have failed to appropriate adequate funds to safely run this year’s elections. .........................................11 President Trump has attacked voting by mail—the safest, most secure way to cast ballots during the pandemic—for purely personal, partisan advantage. ..............12 The Trump administration has failed to safeguard the health of detained and incarcerated individuals. -
ASD-Covert-Foreign-Money.Pdf
overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology �������������������������������������������������������������������������������������������������� -
FBI Agent Peter Strzok Escorted from Building Amid Internal Review
High court should White House faces Judge sends Manafort to VWDQGÀUPO\IRU growing outcry over the jail after Mueller charges free speech migrant family policies witness tampering PAGE 2 PAGE 3 PAGE 4 Volume 20, Issue 17 June 20-26, 2018 lasvegastribune.com FBI agent Peter Strzok escorted from building amid internal review By Olivia Beavers get of unfounded personal attacks, Goelman on Tuesday said parti- The Hill political games and inappropriate san politics called into question the FBI counterintelligence agent information leaks,” his attorney “impartiality” of the investigation Peter Strzok was escorted from the Aitan Goelman said in a statement into Strzok’s conduct. building amid an internal review of Tuesday. “All of this seriously calls into KLVFRQGXFWKLVODZ\HUFRQÀUPHG “Despite being put through a question the impartiality of the Tuesday. highly questionable process, Pete disciplinary process, which now Strzok, who had a central role in has complied with every FBI proce- DSSHDUVWDLQWHGE\SROLWLFDOLQÁX- the FBI investigation into Hillary dure, including being escorted from ence. Instead of publicly calling Clinton’s use of a private email the building as part of the ongoing for a long-serving FBI agent to be server while serving as secretary of internal proceedings.” VXPPDULO\ÀUHGSROLWLFLDQVVKRXOG State, was reportedly escorted from Strzok became a target of Pres- allow the disciplinary process to the FBI building on Friday amid an ident Trump and conservatives play out free from political pres- internal review of his conduct. after -
Democracy Program Strategic Overview 2018 ANNUAL REPORT
Democracy Program Strategic Overview A healthy democracy is dependent upon informed and engaged individuals and communities, and responsive systems of 2018 ANNUAL government REPORT The McCormick Foundation introduces a refreshed Democracy Program strategy. Our work focuses on youth civic engagement, journalism, and governmental reform, and takes place at three levels Our Mission of our democratic system in Illinois: individual, community, and Strengthen democracy in systems. Individuals engage with one another to solve problems in Illinois through informed their communities. They work within democratic systems to resolve and engaged individuals them or to reform the systems themselves, ultimately to the benefit and communities, and of both individuals and their communities. responsive systems of government Individuals Our Goals • Youth are Systems informed, actively participate in their Communities communities, and have healthy civic dispositions Partners and grantees of the Foundation will recognize significant continuity in our strategy. We continue to support youth civic • Journalism is development through a range of investments in civic learning vigorous and free, opportunities and our own Democracy Schools Initiative. Our and an effective commitment to journalism also remains robust across a continuum mediator, that encompasses youth media, healthy local news ecosystems, and informing and investigative reporting. And we still seek to make public institutions connecting all more accessible, responsive, and representative. levels of the democratic system Changes center on the integration of these previously distinct strategies in the democratic context of individuals, communities, • Public institutions and systems. Youth engagement, local journalism, and institutional are inclusive, reform provide opportunities to work at all three levels of our transparent, and democracy to improve its functioning. -
Location-Based Services: Industrial and Business Analysis Group 6 Table of Contents
Location-based Services Industrial and Business Analysis Group 6 Huanhuan WANG Bo WANG Xinwei YANG Han LIU Location-based Services: Industrial and Business Analysis Group 6 Table of Contents I. Executive Summary ................................................................................................................................................. 2 II. Introduction ............................................................................................................................................................ 3 III. Analysis ................................................................................................................................................................ 3 IV. Evaluation Model .................................................................................................................................................. 4 V. Model Implementation ........................................................................................................................................... 6 VI. Evaluation & Impact ........................................................................................................................................... 12 VII. Conclusion ........................................................................................................................................................ 16 1 Location-based Services: Industrial and Business Analysis Group 6 I. Executive Summary The objective of the report is to analyze location-based services (LBS) from the industrial