Thursday, August 23, 2007

Social Networking Site Licenses StrikeForce's `ValidateID(TM)' Identity Validation Solution

Social Networking Site Licenses StrikeForce's `ValidateID(TM)' Identity Validation Solution: "Social Networking Site Licenses StrikeForce’s `ValidateID™' Identity Validation Solution YUNiTi is the first social networking website that makes it easy for users to know that other users are real, and that their Identities have been validated! EDISON, N.J.--(BUSINESS WIRE)--StrikeForce Technologies (OTCBB:SKFT), a company that specializes in the prevention of identity theft, today announced that it has licensed its ValidateID Identity validation solution to YUNiTi; making it the world’s first social networking website to offer a way for users to verify that other YUNiTi users are real; and their identities have been validated. “ is a social networking site aimed at reaching all global markets, safe for all ages, and offering the latest in technology.” said Marcos Boyington, President of YUNiTi. offers the most advanced social networking features on the Internet today, which in addition to offering the usual networking site functionality features the following: * User validation – users can prove who they say they are * Registration and advanced searching of people across the globe * Creation of groups that allows owners to make a profit by charging fo"

Monday, August 20, 2007

LinkedIn: Answers: What topics and admission requirements make sense for a LinkedIn Advanced Workshop?

LinkedIn: Answers: What topics and admission requirements make sense for a LinkedIn Advanced Workshop?: "What topics and admission requirements make sense for a LinkedIn Advanced Workshop? We are about to launch our first IA LinkedIn 'Advanced' Workshop on Aug. 23rd at the University of Colorado. We have held over 30 LinkedIn Basic Workshops (with 700 attendees) in Colorado thus far and are we have been seeing ever-increasing demand for a follow-on Workshop. It was input from others (beginners and advanced users) that made the Basic Workshops so effective. What does the LinkedIn community think about these subtopic questions: • What topics are good for this workshop and are teachable and demonstrable in a WiFi-enabled classroom? • What should be the admission requirements? (e.g. graduated the IA LinkedIn Basic Workshop, 500+, 100+, anyone with money?) • How much should it cost? ($25, $50, $75, $100, $150, $200? More?) You can see more on the Advanced Workshop (as it is now) and other IA LinkedIn training options at They include weekly Webinars. We are currently seeking Affiliates to bring IA’s education and networking to other markets. E-Mail me. Mike O'Neil President Integrated Alliances open to invitations"

Sunday, August 19, 2007

Message Delivery Delay

Yahoo! 360° - Yahoo! Groups Team Blog: "Message Delivery Delay [Update as of 8/19 6:45 pm PDT: Engineers are still working on the problem. While the cause of the backlog is known, they are still working on the fastest way to get all the backlogged messages through the system so that we can return to normal delivery times. Worth noting that the delays will be occuring primarily, though not exclusively, in 'large groups' (those over 75 members) and that these groups will also be having problems with member page related functions]. Just a quick message to let folks that we're aware of the problem many groups are experiencing with long message delays and are working on a fix. We'll post a more definitive update when we have one but did want to assure folks that we're aware of the problem and our engineering team is on it. Apologies for the delay. - Yahoo! Groups Team"

Friday, January 19, 2007

StopBadware Manifesto

StopBadware Manifesto

Posted by Jonathan Zittrain Fri, 27 Jan 2006 15:30:00 GMT

I study the future of the Internet from the perspective of wanting to maintain its “generativity”—its capacity to produce extraordinary change for the good of the world. A profoundly fortuitous set of historical circumstances has led to an “open” Internet and PC, open in the sense of allowing anyone, anywhere, to produce code— software—and to distribute it costlessly and instantly to the world. Instant messaging, Web browsing, email, Skype—all of these features that are now so embedded in the Net’s fabric started from modest, amateur tinkering. The institutions of .com, .org, and .edu have been engaged in a multi-year free-for-all where cool code is imitated, improved upon, and offered to the far corners of the world. This process even spawns non-PC innovation—like mobile phones that look for Internet connections to lessen the price of a phone call—and non-techie innovation—like the explosion of blogs and wikis that are letting the general citizenry express itself in new and collaborative ways without needing an engineering degree.

So while I’m not particularly obsessed with “badware” for its own sake—I manage to keep my computer pretty clean—I am very concerned about a consumer backlash: something that will push the general public into the camp of wanting “locked down” PCs that don’t just run any code from anywhere. is a long-term project designed to (1) explore ways to solve the badware problem, both as a matter of policy (what is and isn’t badware?) and as a matter of tech (how do we avoid it once we know we don’t like it?) and (2) to have the solutions be such that they don’t allow for a new gatekeeper—a single firm that has a “missile battery” that’s so successful at shooting down badware that everyone subscribes, allowing that firm to become a gatekeeper for what will run and what won’t.

Over the long term, I think this means developing tools for the general Internet public to use to give them simple but powerful information they can use about the code they encounter so that they can make an informed decision about it. Imagine a dashboard whose gauges had information such as how many other computers in the world were running the candidate software—and whether their users are on average more or less satisfied with their computers than those who don’t run it. A gauge that showed that a piece of software that was non-existent last week but is now all the rage—that might signal to a cautious computer user that it’s time to wait a bit before running it.

In short, we are a consortium of nonprofit and educational entities supported by a broad base of institutions, including .coms that see the dimension of this problem and realize they can’t take it on alone, chartered to bring to bear legal, policy, and technical analysis, along with common sense, to figure out how to bring this problem under control in a long-term way. We’ll begin by examining some suspect software as a way of trying to produce consensus guidelines, best practices, to clarify just what factors make badware bad. Existing efforts against spyware are nicely complementary to this—and we hope to engage with whomever is eager to work collaboratively on the problem.