Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Businesses

Submission + - Founders at Work:Stories of Startup's Early Days

jsuda writes: "There is a great deal of personal and professional drama and fascinating business and technological insights in the stories of thirty-two founders of computer-era technology businesses contained in "Founders at Work: Stories of Startups' Early Days." Author, Jessica Livingston, has interviewed these entrepreneurs and obtained their perspectives on what happens in the first years of a technology-based startup company. Her goal is to obtain a fund of experience that other people can learn from. She tries to get at the human side of technology.
Her method is in asking these entrepreneurs open ended questions about their experiences in their own startups and letting them relate their histories, perspectives, insights, and advice, in their own words.

        The interviewees make up a grand list of some of the people who helped create and develop the computer industry and the Internet. In hardware, the most prominent are Steve Wozniak of Apple Computer fame, Mike Ramsay of TiVo, Mike Lazaridis of Research in Motion. In software, there are Mitchell Kapor of Lotus Development, Blake Ross of Firefox, and Mena Trott of Six Apart. And, in services, Max Levchin of PayPal, Craig Newmark of craigs list, and Steve Perlman of Web TV stand out. There are nearly two dozen other entrepreneurs who inform, enlighten, and sometimes entertain in their interviews with Ms. Livingston. For instance, Tim Brady, the first non-founder employee of Yahoo retells a story of a storm and power outage at the Yahoo office before a meeting of Yahoo principals and venture capital people which was held in candlelight and with water dripping from ceilings. A gas-fueled generator set up hastily to run the servers was being rated by how many webpages it was serving up, per gallon! The money people were not charmed.

        Among the founders, most were young, and often, mere college students, at the time of their startups. Interestingly, there are only three females in the group, which may or may not imply something about gender and technology, business and entrepreneurship. Only Caterina Fake of Flickr, weighs in much on the gender issue in her interview. She believes that a woman needs to be twice as prepared as a man to be credible with both technical and investment people.

        The bulk of the material concerns computer and network technology and applications, and money. Lots of money. And lots of discussions of money especially in relationship to "VC's" (venture capitalists) who enable creative people with ideas to succeed. Author Livingston herself is one of these capitalists, a founding partner of Y Combinator an investor in some of the companies noted in this book.

        Partly because of her business perspective, and probably mostly because of the dominance of finance and economics in nearly all social affairs, most of the material in the book concerns the symbiotic relationship of inspired creative individuals and creative financial people in producing technological development and change, many times furthering creative good for customers and society, but also facilitating crass commercial interests.

        For many of these entrepreneurs, invested money and "gift" money from enlightened parties called "angels" was a necessary element in producing their dreams of making great products or services for the good of people. For others, the "startup" era (from about the late 1970s to the end of the century) was a time of playing a game of "Who can cash out the most"- founding a beginning technology company, associating with rapacious financial people, and making loads of money when the business "went public", as an "initial public offering" (IPO), which often times ultimately left both the innocent and greedy bereft of value. ( For a satirical view of such gamesmanship, check out the vastly underrated movie comedy/documentary, "Dot", produced in 2002.)

        The author takes no positions on the patent and implied moral issues. Her objective is limited to examining the characteristics of the founders of the successful businesses to see if there are common elements in the people, or patterns in the development of the businesses from initial idea to operating concern providing value to consumers and other businesses.

        She determines that there are such elements: intelligent and skilled individuals, perseverance, comfortability with risk, and maybe most significantly, Luck. After reading the stories of nearly three dozen founders about how their ideas became transformed into productive businesses, it becomes readily apparent that such success is premised, in part, on knowledge and skill, vision and/or inspiration, and perseverance. However, necessary, these elements are insufficient in themselves. Almost every one of the interviewees refers to lucky circumstances and events which conditioned their successes. Some were unsure of the worth of their ideas, at least initially. In most cases, carefully thought-out plans went awry. Almost all founders faced rejection by investors, journalists, and established companies.

        Ms. Livingston's interviewing technique results in personalities being revealed, motivations disclosed, and insightful historical facts about the early developments of the computer industry and the Internet related. A lot of the historical material has been expressed previously elsewhere, but the telling of the stories by the individuals directly involved makes for compelling reading. Some people like Steve Perlman of WebTV, Max Levchin of PayPal, and Steve Wozniak are clearly geeks who love working with hardware and software. Others like Evan Williams of Blogger and Arthur Van Hoff of Marimba seem decidedly businesslike and personally ambitious.

          Some of the people seemed like (or are) heroes. Steve Wozniak, for example can be credited in large part for the PC revolution. He's one of the founders whose motivation was in doing top-quality designs to help the world be a better place. Although he became rich, much of his money has been donated to charities. The relationship of Woz and the co-founder of Apple, Steve Jobs, is fascinating, especially in the contrast of motivations and the distribution of financial gains in the early years. (Woz gave his away; Jobs wanted even more.)

        There are other heroes like Mitchell Kapor of Lotus 1-2-3 fame, whose desire to contribute to society what he was capable of was his primary motivation. Like a number of other founders, financial success was valued for the freedom it provided to do positive deeds rather than for material benefits.

        Not surprisingly, some of these founders realized success by simply scaling up and distributing products they had already designed for themselves. Joshua Schacter of del.icio.us fame needed a way to manage his own 20,000 browser bookmarks and came up with a "tagging" feature which eventually resulted in a sharing and collaborative website business.

        craigslist founder, Craig Newmark, expanded upon his practice of e-mailing notices of local cultural events to his friends into a nationwide service for consumer interaction. The business is one of the rare startups which has remained privately held.

        Hotmail was formed by Sabeer Bhatia as an extension of a personal problem-solving adventure in accessing e-mail remotely beyond his company's firewall. Solving that problem for self and coworkers, led to a business which later grossed $400 million when acquired by Microsoft.

        For those looking for tips on how to mimic the successes of these founders, consider these major themes from the book:

        -make only products that people want.
        -be a leader and make great new products that people will learn to like.

        -go with your own intuitions.
        -make sure to listen and take advice from others, especially your startup team and your eventual customers.

        -make a product or build a business that you are passionate about.
        -be smart and have an exit strategy for your business right from the beginning, "an IPO."

        -make friends and contacts in the business and investment communities, especially the venture capital industry.
        -minimize your involvement with the money people as much as possible in favor of the people who make actual products- programmers and engineers.

        -find a hole in the market and fill it.
        -make something no one else has thought of and create new markets.

        Clear enough? You'll have a to figure it out for yourselves!

          Interestingly, there seems to be one thing nearly everyone agrees on-don't trust Microsoft!"

iPhone Root Password Hacked in Three Days 311

unPlugged-2.0 writes "An Australian developer blog writes that the iPhone root password has already been cracked. The story outlines the procedure but doesn't give the actual password. According to the story: 'The information came from an an official Apple iPhone restore image. The archive contains two .dmg disk images: a password encrypted system image and an unencrypted user image. By delving into the unencrypted image inquisitive hackers were able to discover that all iPhones ship with predefined passwords to the accounts 'mobile' and 'root', the last of which being the name of the privileged administration account on UNIX based systems.' Though interesting, it doesn't seem as though the password is good for anything. The article theorizes it may be left over from development work, or could have been included to create a 'false trail' for hackers."
Yahoo!

Submission + - Yahoo! Begins Tailored Advertising

JThaddeus writes: "The Washington Post (free registration) reports that "Yahoo yesterday launched a system to let marketers tailor advertising content to individual users, theoretically making the ads more effective and, therefore, more lucrative for Yahoo... Yahoo's advertising service, SmartAds, uses behavioral, demographic and geographic information to try to connect people with marketing that caters to their interests. Yahoo said it is its largest effort to cull information about its users.""
Sony

Nielsen Partners With Sony For Game Ad Measurement 19

GameDaily reports that Sony Computer Entertainment of America is partnering with the Nielsen group to assign metrics to in-game advertising. This will allow advertisers to more accurately assess in-game ad campaigns, while Nielsen will be able to gauge consumer interests. "SCEA will provide Nielsen with access to its game network traffic and other data from the PS3 and PlayStation Network, including the upcoming PlayStation Home. Using this information, Nielsen will analyze and benchmark the data to create new measurements for calculating the reach, frequency and effectiveness of game network advertising 'for the benefit of the entire industry.' Nielsen will then combine the SCEA data with its own game usage data, which the company currently collects from more than 12,000 U.S. television households in its National People Meter panel. This is expected to provide a more complete picture of game usage and advertising performance. The SCEA partnership should also help advertisers and agencies to calculate CPMs across PS3s and the PlayStation Network with more detail and accuracy."
Handhelds

Submission + - Unlock your iPhone For Free Via AT&T Loophole

cellphoneer writes: Seth Fogie over at InformIT.com figured out a way to obtain an unlocked iPhone without paying any extra fees. Basically, if you were a customer of AT&T and you upgraded into the iPhone, you still have the option to revert back to your old plan for 30 days. When you do this, just request a new number for your previously activated & unlocked iPhone and they will tell you to take it home and go through the plan selection process via iTunes — except, you really don't have to do this.

While you do lose phone capabilities, you keep the iPod, Safari, Email, and anything else that can be run over the still working Wi-Fi connection. Basically, you now have an iPDA.
Oracle

SAP Admits to 'Inappropriate' Downloading of Oracle Code 149

netbuzz writes "SAP's CEO Henning Kagermann uses the undoubtedly lawyered term 'inappropriate download' to describe the company's questionable actions. Henning blames a rogue business unit, but there can be no mistaking the fact that Oracle caught SAP with its hand in the IP jar on this one. The legal proceedings that will follow should prove interesting. 'The admission hurts SAP's reputation in the battle with Larry Ellison's Oracle in the $56 billion market for software that manages tasks such as payroll. The rivalry between SAP and Oracle escalated when Oracle filed its March 22 lawsuit claiming SAP workers hacked into a Web site and stole software codes on a grand scale.'"
Security

The Current State of the Malware/AntiVirus Arms Race 139

An anonymous reader writes "An article at Net Security explores how malware has developed self-defense techniques. This evolution is the result of the double-edged sword of the malware arms race. Anti-virus technology is ever more advanced, but as a result surviving viruses are increasingly sophisticated. What Net Security offers is a lengthy look at the current state of that arms race. 'There are many different kinds of malware self-defense techniques and these can be classified in a variety of ways. Some of these technologies are meant to bypass antivirus signature databases, while others are meant to hinder analysis of the malicious code. One malicious program may attempt to conceal itself in the system, while another will not waste valuable processor resources on this, choosing instead to search for and counter specific types of antivirus protection. These different tactics can be classified in different ways and put into various categories.'"
Privacy

Submission + - Credit industry opposes anti-ID theft method (yahoo.com)

athloi writes: "Lawmakers across the country — pushed by consumer advocacy groups — are mounting a counterattack. They have passed laws that allow consumers to freeze their credit, a surefire way to prevent thieves from opening new accounts or obtaining a mortgage in a consumer's name. Under a freeze, a consumer cuts off all access to his credit report and score, even his own. All lenders require that information, so no one can borrow money in the consumer's name until he or she lifts the freeze. It's simple, and it works. So, of course, it's under threat from the Consumer Data Industry Association, which represents the Big Three credit bureaus. They make millions gathering and selling consumer data. Freezes cut into that business.

http://news.yahoo.com/s/usatoday/20070703/cm_usato day/aweaponagainstidentitytheft"

Biotech

Submission + - Deep-sea vents spawned pathogens (newscientist.com)

brian0918 writes: "NewScientist reports on the suggestion being made by researchers in Japan that the harsh living conditions around deep-sea hydrothermal vents may have forced the development of highly capable disease-causing bacteria. These vents 'spew superheated water, rich in chemicals, from volcanically active mid-ocean ridges... The study found that vent bacteria frequently lose genes, develop new mutations, or acquire genes from evolutionarily distant sources... The ability to survive in an ever-changing environment is also useful for pathogens under attack from their host's immune system. The team suggests that the bacteria initially lived with vent invertebrates before swapping that location for life as a pathogen.'"
The Courts

Submission + - Round 1 of the RIAA vs. XM Radio goes to...

kidMike writes: The RIAA wins Round 1 in its battle against XM Radio and some portable XM handhelds that can record music for later playback. A judge ruled that the lawsuit has merit and can proceed. XM's defense was that this is simply an example of Fair Use, while the record labels contend that this makes XM into both a broadcaster *and* a distributor. As the owner of one of these devices, I cannot remove(/resell/redistribute) the music that gets recorded, making it more secure than a normal audio cassette recording. From the article:

"'The record companies sufficiently allege that serving as a music distributor to XM + MP3 users gives XM added commercial benefit as a satellite radio broadcaster,' Batts said. Although XM argued in court papers that an XM + MP3 player is much like a traditional radio-cassette player, the judge said 'it is not.'"
The Courts

MySpace Sued by Families of Online Predator Victims 433

MySpace is facing more lawsuits, as the victims of sexual predators have filed suit against the social site and parent corporation News Corp. In total, four families from across the U.S. have joined together after their underage daughters were abused by men they met via MySpace. MySpace has responded to past allegations by putting in place educational efforts and partnerships with law enforcement. The company is also developing technologies to allow parents to have some measure of access to their child's account. From the article: "'In our view, MySpace waited entirely too long to attempt to institute meaningful security measures that effectively increase the safety of their underage users,' said Jason A. Itkin, an Arnold & Itkin lawyer. The families are seeking monetary damages 'in the millions of dollars,' Itkin said."

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...