• Uncategorized

    The Myth of the “Killer App”

    As DataBanker has been pursuing investors, we frequently get asked about our “App Strategy”. More specifically, we’re often advised that we need to go off and build a mobile application, something on a smartphone, or a tablet, that will magically unleash the power of the Internet and pile bags of money at the feet of [...]

    The Myth of the “Killer App”

    March 5, 2013 • Uncategorized • 2 Comments

    As DataBanker has been pursuing investors, we frequently get asked about our “App Strategy”. More specifically, we’re often advised that we need to go off and build a mobile application, something on a smartphone, or a tablet, that will magically unleash the power of the Internet and pile bags of money at the feet of [...]

    Read more →

    Actions Speaker Louder than Words

    “Do as I say, not as I do.”   We’ve all heard it said, probably more than once. One potential source is a parent, tired of explaining why some rule or requirement applied to us but not to them. Or maybe it was your boss at work, emphasizing the fact that their rank and position has [...]

    Actions Speaker Louder than Words

    October 14, 2012 • Uncategorized • 0 Comments

    “Do as I say, not as I do.”   We’ve all heard it said, probably more than once. One potential source is a parent, tired of explaining why some rule or requirement applied to us but not to them. Or maybe it was your boss at work, emphasizing the fact that their rank and position has [...]

    Read more →

    Personal Identity in the Cloud – What’s a Programmer to Do?

    A forum I follow recently made note of a blog post from Craig Burton at KuppingerCole, a European leader in the areas of identity and access management, governance, risk management, and compliance. The post keyed off of the recent Apple iPhone 5 announcement, citing statistics from both Apple and Cisco that document the explosive growth [...]

    Personal Identity in the Cloud – What’s a Programmer to Do?

    September 20, 2012 • Uncategorized • 2 Comments

    A forum I follow recently made note of a blog post from Craig Burton at KuppingerCole, a European leader in the areas of identity and access management, governance, risk management, and compliance. The post keyed off of the recent Apple iPhone 5 announcement, citing statistics from both Apple and Cisco that document the explosive growth [...]

    Read more →

    Technical Marketing – Reflections of an “Old Growth” Hacker

    I recently came across an interesting and thought-provoking blog post from Andrew Chen. The post concerned the increasing pervasiveness of the “Growth Hacker” in Silicon Valley marketing. What distinguishes the Growth Hacker from lesser marketing types is the demonstration of significant technical skill and acumen. This demonstration takes the form of direct data queries, substantive [...]

    Technical Marketing – Reflections of an “Old Growth” Hacker

    August 7, 2012 • Uncategorized • 0 Comments

    I recently came across an interesting and thought-provoking blog post from Andrew Chen. The post concerned the increasing pervasiveness of the “Growth Hacker” in Silicon Valley marketing. What distinguishes the Growth Hacker from lesser marketing types is the demonstration of significant technical skill and acumen. This demonstration takes the form of direct data queries, substantive [...]

    Read more →

    So, What’s Your Data Worth?

    A recent technology post by Alexis Madrigal, senior editor at The Atlantic, suggests that the value of an individual’s data is somewhere between a nickel – 5 lowly cents – and a whopping $1,200.00. All of which makes for an interesting read, but what does it really mean? The first clue is in understanding how [...]

    So, What’s Your Data Worth?

    March 20, 2012 • Uncategorized • 2 Comments

    A recent technology post by Alexis Madrigal, senior editor at The Atlantic, suggests that the value of an individual’s data is somewhere between a nickel – 5 lowly cents – and a whopping $1,200.00. All of which makes for an interesting read, but what does it really mean? The first clue is in understanding how [...]

    Read more →

    IIW and Privacy Informer App Updates

    We were hard at work on a development death march for the weeks leading into the Internet Identity Workshop #13 (conference notes to be posted soon on the IIW website), but we succeeded and Dwight showed the Facebook Privacy Informer App at the conference. The goal of the Privacy Informer App is to analyze the [...]

    IIW and Privacy Informer App Updates

    November 10, 2011 • Uncategorized • 0 Comments

    We were hard at work on a development death march for the weeks leading into the Internet Identity Workshop #13 (conference notes to be posted soon on the IIW website), but we succeeded and Dwight showed the Facebook Privacy Informer App at the conference. The goal of the Privacy Informer App is to analyze the [...]

    Read more →