It is quite foreseen that investors rank new businesses by leader quality. In other words, the entrepreneur quality is more important than the idea.
Research shows that CEO’s who received high scores for character also achieved higher business results. The study insists that every entrepreneur needs to understand the importance of character and leadership which is the key to their growth and success, as much as the ability to attract investors. Read more>>
A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it’s infected your PC. Kaspersky has reported that countries hit the most by Equation include Iran, Russia, Pakistan, Afghanistan, India and China. Targets in those countries included the military, telecommunications, embassies, government, research institutions and Islamic scholars. Read More>>
A partnership of major ad industry groups are rolling out a new program that aims to validate companies that offer anti-piracy services to ad agencies and marketers.With the program, the ad industry hopes to create a structure that should help improve the marketplace, and the market for the use of services that stop piracy. Read More>>
The growth of Non-Practicing Entities (NPEs) – “patent trolls” – is putting the future of U.S. innovation at risk. A sizable set of NPEs buy up overly broad patents, then target relevant companies (often startups flushed with venture funding), and file frivolous patent infringement lawsuits. Thus Consequently, NPEs are having a serious negative impact on innovation. The article reports that companies hit by NPE lawsuits became gun-shy about innovations, resulting in a 20% decline in R&D spending. Read More>>
Federal Communications Commission Chairman Tom Wheeler announced that he will propose to declare broadband service as a utility. These enforceable, bright-line rules will ban paid prioritization, and the blocking and throttling of lawful content and services. Wheeler does not seek to apply provisions relating to rate regulations and says the order won’t impose new taxes or fees. For more details, Read More>>
Internet service providers respond to Federal Communications Commission’s decision to redefine broadband speeds of at least 25 Mbps downstream and 3 Mbps upstream. The trade group argues that the FCC’s definition of broadband should reflect the speeds that people need for “current” and “regular” services. Internet service providers say that regular users can stream Netflix and other services well below 25 Mbps while FCC say that an average household stream at least 3 to 4 devices at a time which would require higher speeds. Read More>>
Verizon, along with one of its advertising partners are getting called on the carpet for their privacy practices.
Turn is using Verizon’s UIDH tracking header to tap into deleted tracking cookies and share them with dozens of major Web sites. Last year, people called it the supercookie because it continued to track users even after they cleared their caches or turned on private browsing. Jonathan Mayer, a computer scientist and lawyer at Stanford, has launched a full-blown investigation into these zombie cookies. Read More>>
Wendy’s has joined its contemporaries in dropping sugary sodas from their children’s meal menus. McDonald’s, Subway, Chipotle Mexican Grill, Arby’s and Panera, among others, have already incorporated the same on their menus. Wendy’s’ move, which is already in effect, was first revealed in a press release sent out by the nonprofit nutrition watchdog Center for Science in the Public Interest. They believe that they are taking a responsible step forward that will improve children’s health and make it easier for parents to make healthy choices for their children. Read More>>
The hack into computer systems at Sony Pictures resulted in the release of numerous confidential corporate documents and email files. How these confidential data was released has been solved by investigators.
According to the investigators, The hackers apparently gained access to Sony’s systems by obtaining the login credentials of a high-level systems administrator in Sony’s I.T. department. Once the credentials were in the hands of the hackers, they were granted “keys to the entire building. Read More>>
Smart Encryption is not loved by everyone, but the question is can it be fatal? A senior official from the U.S. Department of Justice recently told Apple executives that strong encryption could lead to a scenario in which a child could die in a kidnapping case if police couldn’t access the information in a smartphone taken from a suspect. Both Apple and Google said they would provide secure, end-to-end encryption technology by default in their mobile devices running iOS and Android, which means that they would not have access to their users’ private encryption keys, making them unable to adhere to the demands by law enforcement officials to turn over data from the phones. Read More>>