Indicted Megaupload Founder Opens New Sharing Site (Update) 20 January 2013, by Kristen Gelineau

Total Page:16

File Type:pdf, Size:1020Kb

Indicted Megaupload Founder Opens New Sharing Site (Update) 20 January 2013, by Kristen Gelineau Indicted Megaupload founder opens new sharing site (Update) 20 January 2013, by Kristen Gelineau illegal downloads. In Dotcom's typical grandiose style, the launch party featured a tongue-in-cheek re-enactment of the dramatic raid on his home a year earlier, when New Zealand police swooped down in helicopters onto the mansion grounds and nabbed him in a safe room where he was hiding. "Mega is going to be huge, and nothing will stop Mega—whoo!" a gleeful Dotcom bellowed from a giant stage set up in his yard, seconds before a helicopter roared overhead and faux police agents rappelled down the side of his mansion. Dotcom eventually ordered everyone to "stop this madness!" before breaking out into a dance In this Feb. 22, 2012 file photo, Kim Dotcom, the founder alongside miniskirt-clad "guards" as music boomed. of the file-sharing website Megaupload, comments after he was granted bail and released in Auckland, New Bravado aside, interest in the site was certainly Zealand. Indicted Megaupload founder Kim Dotcom has high. Dotcom said half a million users registered for launched a new file-sharing website in a defiant move Mega in its first 14 hours. against the U.S. prosecutors who accuse him of facilitating massive online piracy. The colorful entrepreneur unveiled the "Mega" site ahead of a lavish U.S. authorities are trying to extradite the German- gala and press conference planned at his New Zealand born Internet tycoon from New Zealand, where he mansion on Sunday night, Jan. 20, 2013. (AP is free on bail. Prosecutors say Dotcom made tens Photo/New Zealand Herald, Brett Phibbs, File) of millions of dollars while filmmakers and songwriters lost around $500 million in copyright revenue. Indicted Megaupload founder Kim Dotcom U.S. prosecutors declined to comment on the new launched a new file-sharing website that promises site, referring only to a court document that cites users greater privacy and defies the U.S. several promises Dotcom made while seeking bail prosecutors who accuse him of facilitating massive that he would not—and could not—start a online piracy. Megaupload-style business until the criminal case was resolved. The colorful entrepreneur unveiled the "Mega" site ahead of a lavish gala and news conference at his New Zealand mansion on Sunday night, the anniversary of his arrest on racketeering charges related to his now-shuttered Megaupload file- sharing site. The site Dotcom started in 2005 was one of the most popular sites on the Web until U.S. prosecutors shut it down and accused him and several company officials of facilitating millions of 1 / 4 and-drop upload tool. The key difference is an encryption and decryption feature for data transfers that Dotcom says will protect him from the legal drama that has entangled Megaupload and threatened to put him behind bars. The decryption keys for uploaded files are held by the users, not Mega, which means the company can't see what's in the files being shared. Dotcom argues that Mega—which bills itself as "the privacy company"—therefore can't be held liable for content it cannot see. Indicted Megaupload founder Kim Dotcom appears on a "What he's trying to do is give himself a second- large screen during the launch of a new file-sharing string argument: 'Even if I was wrong before, this website called "Mega" at his Coatesville mansion in one's all right because how can I control something Auckland, New Zealand, Sunday, Jan. 20, 2013. The if I don't know that it's there?'" said Sydney attorney colorful entrepreneur unveiled the site ahead of a lavish Charles Alexander, who specializes in intellectual gala and press conference on the anniversary of his property law. "I can understand the argument; arrest on racketeering charges related to his now- shuttered Megaupload file-sharing site. (AP Photo/New whether it would be successful or not is another Zealand Herald, Richard Robinson) matter." To Dotcom, the concept is very simple. "I can assure the Court that I have no intention and "If someone sends something illegal in an envelope there is no risk of my reactivating the through your postal service," he says, "you don't Megaupload.com website or establishing a similar shut down the post office." Internet-based business during the period until the resolution of the extradition proceedings," Dotcom said in a Feb. 15, 2012, affidavit. Dotcom argues that he can't be held responsible for copyright infringement committed by others and insists Megaupload complied with copyrights by removing links to pirated material when asked. "Our company and assets were taken away from us without a hearing," Dotcom said. "The privacy of our users was intruded on, communications were taken offline and free speech was attacked. Let me be clear to those who use copyright law as a weapon to drown innovation and stifle competition: You will be left on the side of the road of history." Indicted Megaupload founder Kim Dotcom, center, poses with women during the launch of a new file-sharing Mega, like Megaupload, allows users to store and website called "Mega" at his Coatesville mansion in share large files. It offers 50 gigabytes of free Auckland, New Zealand, Sunday, Jan. 20, 2013. The storage, much more than similar sites such as colorful entrepreneur unveiled the site ahead of a lavish Dropbox and Google Drive, and features a drag- gala and press conference on the one-year anniversary 2 / 4 of his arrest on racketeering charges related to his now- shuttered Megaupload file-sharing site. (AP Photo/New Zealand Herald, Richard Robinson) The Motion Picture Association of America, which filed complaints about alleged copyright infringement by Megaupload, was not impressed. "We are still reviewing how this new project will operate, but we do know that Kim Dotcom has built his career and his fortune on stealing creative works," the MPAA said in a statement. "We'll reserve final judgment until we have a chance to take a closer look, but given Kim Dotcom's history of damaging the consumer experience by pushing stolen, illegitimate content into the marketplace, count us as skeptical." Still, as much as Dotcom's new venture might enrage prosecutors and entertainment executives, it shouldn't have any impact on the Megaupload case. "All it might do is annoy them enough to say, 'We're going to redouble our efforts in prosecuting them'," said Alexander, the attorney. "But I don't think it makes any practical difference to the outcome." Dotcom denied the new site was designed to provoke authorities, but got in plenty of digs at their expense, saying that their campaign to shutter Megaupload simply forced him to create a new and improved site. "Sometimes good things come out of terrible events," Dotcom said. "For example, if it wasn't for a giant comet hitting earth, we would still be surrounded by angry dinosaurs—hungry, too. If it wasn't for that iceberg, we wouldn't have a great Titanic movie which makes me cry every time I see it. And if it wasn't for the raid, we wouldn't have Mega." Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. APA citation: Indicted Megaupload founder opens new sharing site (Update) (2013, January 20) retrieved 23 September 2021 from https://phys.org/news/2013-01-indicted-megaupload-founder-site.html 3 / 4 This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. 4 / 4 Powered by TCPDF (www.tcpdf.org).
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Piratez Are Just Disgruntled Consumers Reach Global Theaters That They Overlap the Domestic USA Blu-Ray Release
    Moviegoers - or perhaps more accurately, lovers of cinema - are frustrated. Their frustrations begin with the discrepancies in film release strategies and timing. For example, audiences that saw Quentin Tarantino’s1 2 Django Unchained in the United States enjoyed its opening on Christmas day 2012; however, in Europe and other markets, viewers could not pay to see the movie until after the 17th of January 2013. Three weeks may not seem like a lot, but some movies can take months to reach an international audience. Some take so long to Piratez Are Just Disgruntled Consumers reach global theaters that they overlap the domestic USA Blu-Ray release. This delay can seem like an eternity for ultiscreen is at the top of the entertainment a desperate fan. This frustrated enthusiasm, combined industry’s agenda for delivering digital video. This with a lack of timely availability, leads to the feeling of M is discussed in the context of four main screens: being treated as a second class citizen - and may lead TVs, PCs, tablets and mobile phones. The premise being the over-anxious fan to engage in piracy. that multiscreen enables portability, usability and flexibility for consumers. But, there is a fifth screen which There has been some evolution in this practice, with is often overlooked – the cornerstone of the certain films being released simultaneously to a domestic and global audience. For example, Avatar3 was released entertainment industry - cinema. This digital video th th ecosystem is not complete without including cinema, and in theaters on the 10 and 17 of December in most it certainly should be part of the multiscreen discussion.
    [Show full text]
  • Megaupload Indictment.Pdf
    GENERAL ALLEGATIONS At all times relevant to this Indictment: 1. KIM DOTCOM, MEGAUPLOAD LIMITED, VESTOR LIMITED, FINN BATATO, JULIUS BENCKO, SVEN ECHTERNACH, MATHIAS ORTMANN, ANDRUS NOMM, and BRAM VAN DER KOLK, the defendants, and others known and unknown to the Grand Jury, were members of the “Mega Conspiracy,” a worldwide criminal organization whose members engaged in criminal copyright infringement and money laundering on a massive scale with estimated harm to copyright holders well in excess of $500,000,000 and reported income in excess of $175,000,000. 2. Megaupload.com is a commercial website and service operated by the Mega Conspiracy that reproduces and distributes copies of popular copyrighted content over the Internet without authorization. Since at least September 2005, Megaupload.com has been used by the defendants and other members and associates of the Mega Conspiracy to willfully reproduce and distribute many millions of infringing copies of copyrighted works, including motion pictures, television programs, musical recordings, electronic books, images, video games, and other computer software. Over the more than five years of its existence, the Mega Conspiracy has aggressively expanded its operations into a large number of related Internet businesses, which are connected directly to, or at least financially dependent upon, the criminal conduct associated with Megaupload.com. 3. Megaupload.com was at one point in its history estimated to be the 13th most frequently visited website on the entire Internet. The site claims to have had more than one billion visitors in its history, more than 180,000,000 registered users to date, an average of 2 50 million daily visits, and to account for approximately four percent of the total traffic on the Internet.
    [Show full text]
  • International Intellectual Property Alliance®
    I NTERNATIONAL I NTELLECTUAL P ROPERTY A LLIANCE® 1818 N STREET, NW, 8TH FLOOR · WASHINGTON, DC 20036 · TEL (202) 355-7924 · FAX (202) 355-7899 · WWW.IIPA.COM · EMAIL: [email protected] September 14, 2012 Filed via www.regulations.gov, Docket No. USTR–2012–0011 Stanford K. McCoy, Esq. Assistant U.S. Trade Representative for Intellectual Property and Innovation Office of the U.S. Trade Representative Washington, DC 20508 Re: IIPA Written Submission Re: 2012 Special 301 Out-of-Cycle Review of Notorious Markets: Request for Public Comments, 77 Fed. Reg. 48583 (August 14, 2012) Dear Mr. McCoy: In response to the August 14, 2012 Federal Register notice referenced above, the International Intellectual Property Alliance (IIPA)1 provides the Special 301 Subcommittee with the following written comments to provide examples of Internet and physical “notorious markets” – those “where counterfeit or pirated products are prevalent to such a degree that the market exemplifies the problem of marketplaces that deal in infringing goods and help sustain global piracy and counterfeiting.” We hope our filing will assist the Office of the United States Trade Representative (USTR) in “identifying potential Internet and physical notorious markets that exist outside the United States and that may be included in the 2012 Notorious Markets List.” We express appreciation to USTR for publishing a notorious markets list as an “Out of Cycle Review” separately from the annual Special 301 Report. This list has successfully identified key online and physical marketplaces that are involved in intellectual property rights infringements, and has led to some positive developments. These include closures of some Internet websites whose businesses were built on illegal conduct, greater cooperation from some previously identified “notorious” and other suspect sites, and the facilitation of licensing agreements for legitimate distribution of creative materials.
    [Show full text]
  • Estimating Displacement Rates of Copyrighted Content in the EU
    Estimating displacement rates of copyrighted content in the EU Final Report [Written by Martin van der Ende, Joost Poort, Robert Haffner, Patrick de Bas, Anastasia Yagafarova, Sophie Rohlfs, Harry van Til] [May – 2015] EUROPEAN COMMISSION Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs Unit 0.1 — Chief Economist Team Contact: Kamil Kiljanski E-mail: [email protected] European Commission B-1049 Brussels EUROPEAN COMMISSION Estimating displacement rates of copyrighted content in the EU Final Report Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs Chief Economist Team 2014 EUR [number] EN Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). LEGAL NOTICE This document has been prepared for the European Commission however it reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. More information on the European Union is available on the Internet (http://www.europa.eu). Luxembourg: Publications Office of the European Union, 2014 ISBN [number] doi:[number] © European Union, 2014 Reproduction is authorised provided the source is acknowledged. Printed in [Country] PRINTED ON ELEMENTAL CHLORINE-FREE BLEACHED PAPER (ECF) PRINTED ON TOTALLY CHLORINE-FREE BLEACHED PAPER (TCF) PRINTED ON RECYCLED PAPER PRINTED ON PROCESS CHLORINE-FREE RECYCLED PAPER (PCF) Image(s) © [artist's name + image #], Year. Source: [Fotolia.com] (unless otherwise specified) TABLE OF CONTENTS EXECUTIVE SUMMARY ..................................................................................................
    [Show full text]
  • Effect of Networking Revolution on Digital Music
    International Journal of Digital Society (IJDS), Volume 4, Issue 2, June 2013 The Effect of Networking Revolution on Digital Music Margounakis Dimitrios, Politis Dionysios Computer Science Department, Aristotle University of Thessaloniki Thessaloniki, Greece Abstract The way people consume music in our days has additional advantage of extreme usability and totally changed as a result of the current accessibility. developments in hardware and software, as well as This emerging form of the Internet and the WWW the evolution of the Internet. People do not buy CDs is known by the term “Web 2.0”. The former or records anymore. Nowadays, people store music structure (now known as “Web 1.0”) was based data on their disks and listen to music via portable primarily on passive access to content that someone devices (i-pods, mobile phones etc.). However, the else (usually a professional) created and published. advent of Web 2.0 foretokens colossal changes in the The current trend facilitates the creation, assimilation fields of music production, distribution and and distribution of information and knowledge. management. Cloud computing, social networks and There is a clear separation between highly popular web-based operating systems are some of the recent Web 2.0 sites and the “old Web”. Three kinds of trends that affect these fields and introduce a new shifts can be distinguished: technological (scripting era beyond MP3. and presentation technologies used to render the site and allow user interaction), structural (purpose and layout of the site), and sociological (notions of 1. Introduction friends and groups) [2]. Web sites that have only some of the social Web 2.0 features, but not all, fall in an intermediate category: Web 1.5.
    [Show full text]
  • MPAA: Megaupload Shutdown Was Massive Success
    MPAA: Megaupload Shutdown Was Massive Success Ernesto December 5, 2012 In a filing to the Office of the US Trade Representative the major movie studios describe how successful the shutdown of Megaupload has been. According to the MPAA the file-hosting industry was massively disrupted, with carry-over effects to linking and BitTorrent sites. Nonetheless, the movie group says the work is not done yet and lists The Pirate Bay, Extratorrent, isoHunt, Kat.ph and several other file-hosting and linking sites as remaining threats. Responding to a request from the Office of the US Trade Representative (USTR), the MPAA has submitted a new list of “notorious markets” they believe promote illegal distribution of movies and TV-shows. The document dates back to September but unlike previous years it hasn’t been published in public by the MPAA. TorrentFreak managed to obtain a copy nonetheless, and there are a few things worth highlighting. As one of the main instigators of the Megaupload investigation the MPAA tells the U.S. Government that as a direct result of the takedowns many other “rogue” sites were rendered useless. “This year’s seizures of Megaupload.com and Megavideo.com by the Department of Justice illustrate the extent and impact that hosting hubs have on the online landscape,” MPAA’s Michael O’Leary writes. “When these two websites were taken down, many linking websites, custom search engines, and custom streaming scripts that relied on the sites for content became inoperable. Some websites were abandoned by their operators, others lost traffic, while still others shifted their business model.” More indirectly, the Megaupload shutdown also impacted other file-hosting businesses and their customers.
    [Show full text]
  • Ipoque Internet Study 2008/2009
    Internet Study 2008/2009 Hendrik Schulze, Klaus Mochalski For the third year in a row, after 2006 and 2007, ipoque has conducted a compre- hensive study measuring and analyzing Internet traffic in eight regions of the world. The study includes statistical data about popularity and user behavior for all common network protocols. This covers most applications used in today’s Internet such as Web browsing, media streaming, P2P file sharing, one-click file hosting, instant mes- saging, Internet telephony and online games. BitTorrent and eDonkey downloads have been analyzed to classify the transfered files according to their content type. Some of the key findings are: P2P still produces most Internet traffic worldwide al- though its proportion has declined across all monitored regions – loosing users to file hosting and media streaming; regional variations in application usage are very prominent; and Web traffic has made its comeback due to the popularity of file host- ing, social networking sites and the growing media richness of Web pages. Introduction What Is New? What Is Different? This study uses the same methodology as the 2007 Internet Key facts Study1 to classify network traffic according to protocol and protocol class. Several of ipoque’s ISP and university cus- • 8 regions: Northern Africa, Southern Africa, South tomers agreed to provide anonymized traffic statistics col- America, Middle East, Eastern Europe, Southern lected by PRX Traffic Managers installed in their networks. Europe, Southwestern Europe, Germany Protocols and applications are detected with a combination • 1.3 petabytes of user traffic monitored of layer-7 deep packet inspection (DPI) and behavioral • 1.1 million users represented traffic analysis.
    [Show full text]
  • State of the Art in Peer-To-Peer Performance Testing
    State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality assurance since 1991 Business Areas Test and certification of network components for manufacturers Network design consultancy and proof of concept testing for service providers Request for Proposal (RfP) support, acceptance testing and network audits for large enterprises and government organizations EANTC Berlin, Germany Agenda 1. How much P2P traffic is out there today? 2. What categories of DPI detection solutions exist? 3. How is EANTC testing P2P filters? What are the key performance indicators? 4. What were the results of the InternetEvolution test? P2P Internet Statistics Traffic Statistics Germany P2P Protocols in Germany P2P 74% BitTorrent 66% eDonkey 29% HTTP 11% Tunnel/ Other df Encryption Media Streaming 0% Gnutella 0% DirectConnect NNTP DDL* 8% 4% 1% 0% 5% FTP E-Mail IM VoIP/Skype 1% 0% 0% 1% * DDL: Direct download links of one-click file hoster like RapidShare.com or MegaUpload.com Source: ipoque Internet study 2007 P2P Detection – Signature Based Each P2P protocol has its own mechanism to manage the P2P network and coordinate the traffic distribution P2P filter devices search for protocol specific pattern (signature) in each IP packet to identify P2P traffic Deep Packet Inspection (DPI) - once the signature is identified the detection reliability is high Encrypted P2P traffic is hard to identify with this method BitTorrent Signature Example BitTorrent Signature P2P Detection – Behavior Based P2P software implements mechanism to avoid detection – obfuscation (e.g. encrypted transfer) P2P traffic has specific behavior: Each client opens connections to many other clients file/tracker requests and file search (mostly not encrypted) File Search/Request (not encrypted) .
    [Show full text]
  • Call of Duty Modern Warfare 2019 Download Full Game for FREE Crack Skidrowmp4 Macosx
    Call Of Duty Modern Warfare 2019 Download Full Game For FREE Crack SKIDROW.mp4 MacOSX Call Of Duty Modern Warfare 2019 Download Full Game For FREE Crack SKIDROW.mp4 MacOSX 1 / 4 2 / 4 ... full movie in hin) Call of Duty Modern Warfare 2019 Download Full Game for FREE Crack SKIDROW.mp4 MacOSX Adobe Audition CC 2017.. As it happened with each new version, Call of Duty: Modern Warfare 3 ... SKIDROW CRACK: Download ... Adobe After Effects cc Crack 2020 full. free download ... CC 2019 16.1 for Mac free latest version offline setup for Mac OS X by ... (audio) or mp4 (video) files and download them for free - this service .... Red Dead Redemption 2 . crackwatch.com Codex vs RDR2 : CrackWatch ... where it'll be entirely DRM-free and come with GOG Galaxy 2.0 support. ... Does xbox work like it has to download the entire digital game and the disc is just ... and profits, mainly due to the popularity of Call of Duty: Warzone.. Call Of Duty Modern Warfare 2019 Download Free Crack PC Skidrow ... 2019 Download Full Game for FREE Crack SKIDROW.mp4 MacOSX. Call of Duty Modern Warfare 2 Black Box Game free downloading 1. ... Call of Duty Modern Warfare 2 AI Zombies Mod 1. mw3 hack pc mw3 hack download ... Play multiplayer online with mods amp cheats Apr 09 2019 Dll Injector Hacker is a ... for community acquired methicillin resistant S. DLL MODS MP4 360p MP4 720p.. 3212, Rasen no Sora, Apr 8, 2019, $14.99, N/A (N/A), 0 .. Hack. 'n' Slash. ... and Free download Yosuga no Sora English Full Cracked by SKIDROW.
    [Show full text]
  • Collaboration Opportunities for Content Delivery and Network Infrastructures
    Collaboration Opportunities for Content Delivery and Network Infrastructures Benjamin Frank, Ingmar Poese, Georgios Smaragdakis, Anja Feldmann, Bruce M. Maggs, Steve Uhlig, Vinay Aggarwal, and Fabian Schneider 1 Motivation The Internet is a hugely successful man-made artifact that has changed society fundamentally. Imagine the effect a prolonged outage of the Internet would have: (1) Youngsters wouldn’t know how to interact with their peers and how to spend their leisure time as they increasingly rely on social networks, online games, YouTube, and other online entertainment offerings. (2) Manufacturing would hit a roadblock as the communication paths within and between companies increasingly rely on the Internet. (3) Control of critical infrastructures would be hampered as it increasingly relies on the Internet for gathering input data and propagating control information. In becoming a hugely successful infrastructure, the usage of the Internet and thus its structure has also undergone continuous changes. Usage has changed from dominance by email and FTP in the early days, to the World Wide Web (WWW) from 1995 to 2000, to peer-to-peer applications (P2P) from 2000 to 2007, back to the WWW since 2007. These changes are driven in part by the Internet users’ interests as well as how content, including user generated content, is made available. When considering the current application mix and traffic streams in the Internet, the latest buzz is that “Content is King” just as Bill Gates [28] predicted in his essay from 1996. Hereby, the term content has to be seen very broadly and encompasses everything from commercially prepared content, e.g., broadcast and interactive TV, news, and software, to user-generated content, e.g., videos uploaded to YouTube, and photos uploaded to Flickr, to interactive activities, e.g., online games.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise Fall Edition 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales: 866.207.0077 www.paloaltonetworks.com Table of Contents Executive Summary................................................................................................................. 3 Introduction............................................................................................................................. 4 Enterprise 2.0 Application Usage ............................................................................................ 5 SharePoint Usage Continues Its Rapid Growth........................................................................................ 6 Watch Out Microsoft, Here Comes Google ............................................................................................... 6 WebEx Competitors Show Increased Usage............................................................................................. 6 Twitter Rises From Nowhere.................................................................................................................... 6 Facebook Expands Its Dominance............................................................................................................ 7 Employees Are Active Contributors.......................................................................................................... 8 Enterprise 2.0 Benefits Are No Longer Elusive......................................................................
    [Show full text]