Facebook, Inc. Strategic Analysis Faizan Qureshi BPS 4305.502 Soo Jung Kim

Total Page:16

File Type:pdf, Size:1020Kb

Facebook, Inc. Strategic Analysis Faizan Qureshi BPS 4305.502 Soo Jung Kim Facebook, Inc. Strategic Analysis Faizan Qureshi BPS 4305.502 Soo Jung Kim Executive Summary Facebook, a company which attributes its humble beginnings to a student in a college dorm room, has had an explosive amount of growth in the past ten years. There isn‟t a major website, corporation, or even a university that doesn‟t have its own Facebook page. This staggering fact illustrates the profound impact that this company has had at all levels of business and has embedded itself in contemporary culture. In fact, Facebook‟s position in the social media market is so strong that there is no major platform that can directly compete with it. However, many of Facebook‟s most vocal critics have used the “bigger they are the harder they fall” approach when criticizing the success of Facebook by asserting that all it takes is another revolutionary website that will blindly attract the masses to knock Facebook out of its spotlight. It‟s a valid assertion given the fate of websites such as MySpace and Xanga. Given the fickle nature of consumers collectively, Mark Zuckerberg torpedoed an approach to this website in which the dynamics is constantly changing, new features are available, and most crucially, branding the name of his company into different aspects of people‟s lives. Facebook is not only an American name, but it is also an international brand which transcends to different nationalities and different cultures. Introduction The fundamental problem of Facebook has always been the issue of Privacy of its millions of users who unlike the founder, have a more limited definition of making the world a more open and connected place. Facebook was originally founded by Mark Zuckerberg, who as of today is still the Chief Executive Officer of Facebook. Originally intending to be just a „Harvard Connection‟ Facebook‟s primary motive was to be a website exclusive to Harvard students and as a way for them to be able to interact and meet with each other. Harvard University had a policy that did not allow basic information of students, such as a photo and a list of individual names next to the each photo being available to the student body. Mark Zuckerberg, seeing this redundant policy, tried unsuccessfully to have Harvard release this basic information. He ultimately decided to take matters into his own hands, and through hacking the Harvard computer system, along with breaking a dozen school rules, he obtained the basic information of the student body. He decided to share this information with the public through a website called „Facemash‟ which portrayed photos of female students side by side and asked the user to rate them based on attractiveness. After the Harvard staff discovered the incident, they disciplined Mr. Zuckerberg and asked him to take down the website or face expulsion. Mark wasn‟t discouraged, however, because internally he still believed that connecting people and making his campus a more open place was the right thing to do. This led him to create a website called TheFacebook.Com, which was anticipated for students to enter their individual basic information, and subsequently have access to many students as contacts for social interaction. In spring of 2004, TheFacebook.com was formally launched at Harvard and as awareness of the website grew through word of mouth, many students started to create their own Facebook page. Students would use it for interacting and meeting, for example, during exam times, students would network online to create study groups. Everything seemed well at the beginning, but little did Mark know that his legal troubles were about to begin. A few days after the initial startup, three of Zuckerberg‟s classmates filed a lawsuit which asserted that Mark used their own idea for a network connection, and promoted it as his own creation. The lawsuit was later settled out of court. As Facebook grew at Harvard, Zuckerberg decided that it wasn‟t prudent to keep the website exclusively for Harvard students and within a few months, Facebook was available in at least thirty different campuses. This was the turning point of Mr. Zuckerberg‟s fortunes, because at this time it was realized that Facebook was not only going to be reserved at the local level or even at Universities, but it had the potential to expand to a national and international brand name, which as history records, is exactly what happened. After his second year at Harvard, Mark, and two of his classmates Dustin Moskovitz and Chris Hughes, made the bold decision to move to Palo Alto and the Silicon Valley to which it is home to. This was also when Zuckerberg collaborated with Sean Parker, founder of the peer to peer file sharing program, Napster. Parker, being an experienced Entrepreneur, guided Zuckerberg to find the big players of investment in his company because in the beginning Mark didn‟t want to simply generate revenue form ads, which would make his website unique. This was also the time when Mr. Zuckerberg was introduced to Peter Thiel, co-founder of PayPal and managing partner of Founders Fund. Peter Thiel, invested $500,000 into Facebook, giving it the trajectory to launch into the multibillion dollar company it has become. After passing the 1,000,000 user mark in November of 2004, Facebook received another investment, this time from Accel Partners for a total of $12.7 million. With this new plethora of capital, Mark Zuckerberg took the initiative to buy some office space, hire a network of engineers, and lead his colleagues to a position on the Fortune 500 charts. External Analysis Before a discussion about the specific governmental guidelines that have inhibited profit producing of Facebook, I want to have a discussion about the primary category that Facebook belongs to and which market it hopes to prosper in. Facebook is a website which has substantial complementary fields that divide into games, applications, and of course, social media promotion. It is an online set of connections which aspires to restructure as its Chairman Mr. Zuckerberg has frequently stated. It‟s a social listing where colleagues, clients, businesspersons, and many other individuals can get in touch with another. The essential trade model and the many divisions have vulnerabilities with regard to environmental regulation. Moreover, it will specifically have particular consequences in many laws which state the privacy of the individual extends to the data uploaded and also explicit guidelines amongst online ads to get rid of even the smallest idea of a competitive advantage. Following the discussion of two ecological factors which will extraordinarily affect the mode of operation of Facebook, there will be a discussion of the Porter‟s five forces independently with a section committed to each part: bargaining power of suppliers, bargaining power of customers, intensity of existing rival, threat of substitutes, & lastly the threat of new competitors. One of the most crucial repercussions as discussed above is indeed the privacy of those that use Facebook with regard to the data they upload and this will be where we begin the discussion. To give some legitimacy for this grievance, it‟s important to realize that there is a legal precedent for this outcry of privacy. It can be traced to a regulation called the European Data Protection Regulation. The basis of this law is defined in the following manner: Users must be notified exactly when their data it is being used, for what purpose it is being used, and the duration of its use. This is a direct contradiction with the essence of Facebook because Facebook uses user data in the form of photos, wall posts, and many of its features that make up its website. This essentially requires Facebook to set up protocols to directly inform the users how their information is being used, which as opposed to all its progress is an issue that it has significantly lacked in. In addition, if there is a data leak, for example, the servers being hacked, then the company must inform its users within 24 hours. This is a sufficient amount of time to notify and do a thorough cleaning to make sure that any breach of security has been dealt with. The consequences of such leaks, which happen from time to time to many of the best companies is more fines and regulations imposed by the government but even more importantly, consumers will lose faith in the company, which could amount to revenue lost in millions. The following point of discussion relates to Social Media Marketing. Facebook prides itself at the fact that “It‟s free and always will be” Therefore, much of the revenue that it generates is in the form of advertisements. Starting in the spring of 2013, Fair Trade Federation guidelines have set an entire array of new standards and requirements for advertisements in order for them to be “clear and conspicuous”. Before going into the particular ramifications of these guidelines, we will have a short discussion on their specific contents. According to the FTF the advertisement‟s disclosure must be “clear in intent, hyperlinks must be visible, and disclosure supersedes any online transaction pertaining to the product.” The main ramification is the reality that advertisements first and foremost produce revenue through the appropriate mix of directness and shrewdness. To be able to market merchandise, one is required to only be attentive of the positives. As an advertisement become abundantly “clear and conspicuous”, more social media marketers statistically see a noteworthy plummet in the revenue derived from advertisements. The lasting consequence of this action is that it will have a direct impact on the primary method of revenue for Facebook.
Recommended publications
  • AI, Robots, and Swarms: Issues, Questions, and Recommended Studies
    AI, Robots, and Swarms Issues, Questions, and Recommended Studies Andrew Ilachinski January 2017 Approved for Public Release; Distribution Unlimited. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor. Distribution Approved for Public Release; Distribution Unlimited. Specific authority: N00014-11-D-0323. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Photography Credits: http://www.darpa.mil/DDM_Gallery/Small_Gremlins_Web.jpg; http://4810-presscdn-0-38.pagely.netdna-cdn.com/wp-content/uploads/2015/01/ Robotics.jpg; http://i.kinja-img.com/gawker-edia/image/upload/18kxb5jw3e01ujpg.jpg Approved by: January 2017 Dr. David A. Broyles Special Activities and Innovation Operations Evaluation Group Copyright © 2017 CNA Abstract The military is on the cusp of a major technological revolution, in which warfare is conducted by unmanned and increasingly autonomous weapon systems. However, unlike the last “sea change,” during the Cold War, when advanced technologies were developed primarily by the Department of Defense (DoD), the key technology enablers today are being developed mostly in the commercial world. This study looks at the state-of-the-art of AI, machine-learning, and robot technologies, and their potential future military implications for autonomous (and semi-autonomous) weapon systems. While no one can predict how AI will evolve or predict its impact on the development of military autonomous systems, it is possible to anticipate many of the conceptual, technical, and operational challenges that DoD will face as it increasingly turns to AI-based technologies.
    [Show full text]
  • Top Tips to Protect Your Privacy and Data (PDF)
    Top Tips to Protect Your Privacy and Data Monday, Jan. 28th is Data Privacy Day Data Privacy Day is held on January 28th every year. It is an effort to empower people to protect their privacy and control their digital footprint and escalate the protection of privacy and data as everyone’s priority. Presented by: Tim Gurganus 1/28/2013 Data Privacy Day 2013 Top Tips to Protect Your Privacy and Data January is Data Privacy Month OIT is hosting several activities during Data Privacy Month (January) to empower campus users to protect their privacy and to control their digital footprint. All events will be held in DH Hill Library Auditorium 12pm – 1pm Tuesday: “What Data is sensitive and How do we keep it private?” Thursday: “Data Protection, Privacy and the Law” NCSU Privacy Month website: http://go.ncsu.edu/dpm2013 Top Tips to Protect Your Privacy and Data Student Data Privacy @ NCSU The University publishes an directory online. You can control what information is displayed using the instructions in this document: http://www.ncsu.edu/registrar/forms/pdf/privacyblock.pdf You can update or remove your personal information by logging into the MyPack portal at: http://mypack.ncsu.edu Under the FOR STUDENTS tab in MyPack Portal, select Privacy Settings . Top Tips to Protect Your Privacy and Data Faculty/Staff Data Privacy @ NCSU The University publishes an directory online. You can update or remove your personal information by visiting this website: https://ssl.ncsu.edu/directory/updatelisting.php The University also maintains other personal information about you that you can view and update in the MyPack Portal: http://mypack.ncsu.edu Under the FOR Faculty and STAFF tab in MyPack Portal, select Employee Self-Service and then Personal Information Top Tips to Protect Your Privacy and Data Pick Good Passwords • Passwords should be hard to guess and longer is better • Use good passwords with strength appropriate for the importance of the site.
    [Show full text]
  • Facebook Graph Search POV
    January 2013 Facebook Graph Search POV Facebook Graph Search POV Introduction On January 15, 2013 Facebook introduced the world to Graph Search. Released in beta, Graph Search joins News Feed and Timeline as Facebook’s third foundational pillar, allowing users to search their social graphs with queries such as: • Friends who like Florence + the Machine • National Parks liked by people who speak Russian and live in Burlington, VT • Photos taken before 2005 Search results draw from any information a Page, place, group, app, game, or person has shared with connections or the public. The first version of Graph Search focuses on people, photos (excluding Instagram), places, and interests, but will expand to include data from posts, status updates, and third- party apps. Search results are unique to each person as no two social graphs are the same. Also, results are based not just on relationships, but rather strength of the relationships. A search for “People who like the things I like” might yield a set of results that look something like the image below. Since that particular search results in over 1,000 people it might be worth filtering. Using the column on the right, users can filter by categories like gender, relationship, current city, and employer. Figure 1 Sample Graph Search results for People who like the things I like 1 Facebook Graph Search POV Results are not just unique based on social graphs, they are also dependent on what Facebook determines to be the category of search. If Facebook thinks it’s a recruiting search the results will contain snippets of people’s work history.
    [Show full text]
  • A Pilot Study for Fiji English André Huber Universi
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2015 Facebook graph search for refined screen-based data collection in CMC:A pilot study for Fiji English Huber, André DOI: https://doi.org/10.1016/j.dcm.2015.03.001 Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-115932 Journal Article Accepted Version The following work is licensed under a Creative Commons: Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License. Originally published at: Huber, André (2015). Facebook graph search for refined screen-based data collection in CMC: A pilot study for Fiji English. Discourse, Context Media, 10:10-18. DOI: https://doi.org/10.1016/j.dcm.2015.03.001 Facebook Graph Search for Refined Screen-Based Data Collection in CMC – A Pilot Study for Fiji English André Huber University of Zürich, English Department, Plattenstrasse 47, 8032 Zürich, Switzerland. [email protected], (+41) 44 634 39 37 Abstract In sociolinguistics, the advantages of web-based research are often lost because it can rarely satisfy the need for social variables without additional offline data. Facebook Graph Search is a new query tool, which allows highly specific retrieval of Facebook users and can thus mitigate this dilemma. In this paper, Facebook Graph Search will be introduced and a pilot study in computer-mediated communication and Fiji English will demonstrate the suitability of Graph Search for exploratory research in a speech community. The pilot study shows that there are differences in language choice based on age and context of use: English is preferred over local indigenous languages by younger users and in wall posts.
    [Show full text]
  • Safe on Social Guide to FACEBOOK
    2018 Safe on Social Guide to safeonsocial.com Facebook Published by Safe on Social Media Pty Ltd Copyright Safe on Social Media Pty Ltd 2017 The moral right of the author has been asserted No part of this e-book or its associated modules may be reproduced or transmitted by any person or entity in any for by any means, electronic or otherwise including photocopying, recording or scanning or by any information storage without prior permission other than the licensor who is licensed to use this information on their website, in newsletters and in print and has been granted permission from the publisher under an annual license. The publisher, authors, licensee, licensor and their respective employees or agents will not accept responsibility for injuries or damage, physical or emotional occasioned to any person as a result of a social media use or any other activities described in this e-book. Whilst every attempt has been made to ensure that the information in this e-book is accurate, it is the nature of social media to be constantly changing. Therefore, Safe on Social Media Pty Ltd gives no guarantees to the completeness or accuracy of the contents of this guide. Contents (currently updating) About Facebook....................................................................................................................................................4 Advantages and disadvantages of Facebook...................................................................................................5 Safety Check.........................................................................................................................................................5
    [Show full text]
  • Privacy Requirements of Social Networking Service Muhammad Farrukh Anwar
    Privacy requirements of social networking service Muhammad Farrukh Anwar University of Tampere School of Information Sciences Computer Science / Int. Technology M.Sc. thesis Supervisor: Zheying Zhang June 2016 1 University of Tampere School of Information Sciences Computer Science / Software Development Forename Surname: Muhammad Farrukh Anwar M.Sc. thesis, 62 pages, 56 index and appendix pages June 2016 Users’ privacy in the setting of an open internet environment, combined with a social networking environment has increased privacy related vulnerabilities. Privacy vulnerability represents the flaws in an environment or the lack of security from service providers to prevent privacy problems beforehand. Failure to protect user privacy could increase the chances that users’ data would be transferred without consent, duplicated, shared or used in an inappropriate context. Social networking services (SNS) mostly rely on user data to operate properly, user data can be provided by user, can be collected from alternate sources, or could be requested by SNS themselves. Data shared by the user may contain personal information, and inappropriate use of that personally identified information (PII) is the main concern in this study. This study aims at analyzing privacy vulnerabilities in a social media context. The study explores vulnerabilities and privacy policies, and falls in the category of qualitative research. A method to analyze risk imposed by each vulnerability is also discussed at the end of this study. These heuristics are outcome of analysis of various privacy related concepts and privacy taxonomy proposed by Anton (2004). Individual interviews were also carried out to validate findings of this research where developers were asked questions related to privacy vulnerabilities extracted from Facebook privacy policies and other available documents.
    [Show full text]
  • My Facebook® for Seniors
    My Facebook® for Seniors Michael Miller 800 East 96th Street, Indianapolis, Indiana 46240 USA My Facebook for Seniors Editor-in-Chief Greg Wiegand Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or Acquisitions Editor transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, Michelle Newcomb without written permission from the publisher. No patent liability is assumed with respect Development Editor to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors Charlotte Kughen or omissions. Nor is any liability assumed for damages resulting from the use of the informa- Managing Editor tion contained herein. Kristy Hart ISBN-13: 978-0-7897-5166-9 ISBN-10: 0-7897-5166-6 Senior Project Editor Library of Congress Control Number: 2013943644 Lori Lyons Printed in the United States on America Indexer First Printing: September 2013 Ken Johnson Trademarks Proofreader All terms mentioned in this book that are known to be trademarks or service marks have Kathy Ruiz been appropriately capitalized. Que Publishing cannot attest to the accuracy of this infor- mation. Use of a term in this book should not be regarded as affecting the validity of any Technical Editor trademark or service mark. Sheila McDermott Warning and Disclaimer Publishing Every effort has been made to make this book as complete and as accurate as possible, but Coordinator no warranty or fitness is implied. The information provided is on an “as is” basis.
    [Show full text]
  • Unicorn: a System for Searching the Social Graph
    Unicorn: A System for Searching the Social Graph Michael Curtiss, Iain Becker, Tudor Bosman, Sergey Doroshenko, Lucian Grijincu, Tom Jackson, Sandhya Kunnatur, Soren Lassen, Philip Pronin, Sriram Sankar, Guanghao Shen, Gintaras Woss, Chao Yang, Ning Zhang Facebook, Inc. ABSTRACT rative of the evolution of Unicorn’s architecture, as well as Unicorn is an online, in-memory social graph-aware index- documentation for the major features and components of ing system designed to search trillions of edges between tens the system. of billions of users and entities on thousands of commodity To the best of our knowledge, no other online graph re- servers. Unicorn is based on standard concepts in informa- trieval system has ever been built with the scale of Unicorn tion retrieval, but it includes features to promote results in terms of both data volume and query volume. The sys- with good social proximity. It also supports queries that re- tem serves tens of billions of nodes and trillions of edges quire multiple round-trips to leaves in order to retrieve ob- at scale while accounting for per-edge privacy, and it must jects that are more than one edge away from source nodes. also support realtime updates for all edges and nodes while Unicorn is designed to answer billions of queries per day at serving billions of daily queries at low latencies. latencies in the hundreds of milliseconds, and it serves as an This paper includes three main contributions: infrastructural building block for Facebook’s Graph Search We describe how we applied common information re- product. In this paper, we describe the data model and • trieval architectural concepts to the domain of the so- query language supported by Unicorn.
    [Show full text]
  • Identification – Toward an Identifiability-Based Framework for Privacy Impact Assessment
    Die approbierte Originalversion dieser Dissertation ist in der Hauptbibliothek der Technischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Chasing shadows: the interplay of privacy and (digital) identification – toward an identifiability-based framework for privacy impact assessment DISSERTATION submitted in partial fulfillment of the requirements for the degree of Doctor of Social and Economic Sciences by Stefan Strauß Registration Number 09855841 to the Faculty of Informatics at the Vienna University of Technology Advisor: Prof. Dr.Wolfgang Hofkirchner The dissertation has been reviewed by: _______________________ _______________________ (Prof. Dr. Ingrid Schneider) (PD Dr. Michael Nentwich) Wien, 25.07.2017 _______________________ (Stefan Strauß) Technische Universität Wien A-1040 Wien ■ Karlsplatz 13 ■ Tel. +43-1-58801-0 ■ www.tuwien.ac.at Chasing shadows: the interplay of privacy and (digital) identification – toward an identifiability-based framework for privacy impact assessment DISSERTATION zur Erlangung des akademischen Grades Doktor der Sozial- und Wirtschaftswissenschaften eingereicht von Stefan Strauß Matrikelnummer 09855841 An der Fakultät für Informatik der Technischen Universität Wien Betreuung: Prof. Dr.Wolfgang Hofkirchner Diese Dissertation haben begutachtet: _______________________ _______________________ (Prof. Dr. Ingrid Schneider) (PD Dr. Michael
    [Show full text]
  • 14684 FULLTEXT.Pdf (5.628Mb)
    Graph-Based Storage In Social Networks Kristine Steine Master of Science in Computer Science Submission date: May 2016 Supervisor: Svein Erik Bratsberg, IDI Norwegian University of Science and Technology Department of Computer and Information Science Abstract How do we efficiently store an ever-growing amount of data? How do we re- trieve and analyze relationships between data quickly? These are among the concerns faced by companies such as Google, Yahoo, Amazon, and Facebook today. As the world’s leading tech companies are tackling the challenge of their data aggressively increasing in size, NoSQL databases are emerging as their weapon of choice. Immediate consistency is sacrificed to gain higher scalability and availability. In the case of social networking services, NoSQL graph databases are obvious contenders for the role currently held by relational databases. This thesis explores the suitability of graph databases as the main storage for these services. Our research suggests that while using graph databases for social network- ing services eases the task of software development, today’s leading graph databases are not as robust and mature as these services require. ii Sammendrag Hvordan kan vi e↵ektivt lagre en stadig voksende mengde data? Hvordan kan vi raskt hente ut og analysere relasjoner mellom data? Dette er bekymringer selskaper som Google, Yahoo, Amazon og Facebook møter i dag. Samtidig som verdens ledende teknologiselskaper takler utfordringen med at dataene deres øker aggressivt i størrelse, vokser NoSQL-databaser frem som deres redning. Umiddelbar konsistens ofres for ˚aoppn˚abedre skalerbarhet og til- gjengelighet. For tilfellet sosiale nettverk er NoSQL-grafdatabaser ˚apenbare utfordrere for rollen relasjonsdatabaser har i dag.
    [Show full text]
  • Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More
    CHAPTER 2 Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More In this chapter, we’ll tap into the Facebook platform through its (Social) Graph API and explore some of the vast possibilities. Facebook is arguably the heart of the social web and is somewhat of an all-in-one wonder, given that more than half of its 1 billion users1 are active each day updating statuses, posting photos, exchanging messages, chatting in real time, checking in to physical locales, playing games, shopping, and just about anything else you can imagine. From a social web mining standpoint, the wealth of data that Facebook stores about individuals, groups, and products is quite exciting, because Facebook’s clean API presents incredible opportunities to synthesize it into information (the world’s most precious commodity), and glean valuable insights. On the other hand, this great power commands great responsibility, and Facebook has instrumented the most sophisticated set of online privacy controls that the world has ever seen in order to help protect its users from exploit. It’s worth noting that although Facebook is self-proclaimed as a social graph, it’s been steadily transforming into a valuable interest graph as well, because it maintains rela‐ tionships between people and the things that they’re interested in through its Facebook pages and “Likes” feature. In this regard, you may increasingly hear it framed as a “social interest graph.” For the most part, you can make a case that interest graphs implicitly exist and can be bootstrapped from most sources of social data. As an example, Chap‐ ter 1 made the case that Twitter is actually an interest graph because of its asymmetric “following” (or, to say it another way, “interested in”) relationships between people and other people, places, or things.
    [Show full text]
  • Appendix A: Facebook Timeline (October 2003 – August 2014)
    Appendix A: Facebook Timeline (October 2003 – August 2014) 2003 October • Mark Zuckerberg releases Facemash , the predecessor to Facebook. It was described as a Harvard University version of Hot or Not . 2004 January • Zuckerberg begins writing Facebook . • Zuckerberg registers thefacebook.com domain. February • Mark Zuckerberg and co-founders Dustin Moskovitz , Chris Hughes , and Eduardo Saverin launch Facebook on February 4. • 650 Harvard students joined thefacebook.com in the fi rst week of launch. March • Facebook expands to MIT , Boston University , Boston College , Northeastern University , Stanford University , Dartmouth College , Columbia University , and Yale University . April • Zuckerberg, Dustin Moskovitz , and Eduardo Saverin form Thefacebook.com LLC, a partnership. © Springer Science+Business Media New York 2014 367 N. Lee, Facebook Nation, DOI 10.1007/978-1-4939-1740-2 368 Appendix A: Facebook Timeline (October 2003 – August 2014) June • Facebook receives its fi rst investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its headquarters to Palo Alto, California. August • To compete with growing campus-only service i2hub , Zuckerberg launches Wirehog . It is a precursor to Facebook Platform applications . September • Facebook launches Facebook Wall for users to post messages to their friends. • ConnectU fi les a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three- year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment.
    [Show full text]