You are here
Submitted by Scott Cleland on Fri, 2012-02-17 16:20
(Note: The text in quotations are verbatim quotes from Google via a Politico post. The italics in [ ] is a satirical translation of what Google really is saying.)
“Google’s Rachel Whetstone, senior vice president for Communications and Public Policy issued the following statement to POLITICO regarding a WSJ report that the company has been bypassing the privacy settings of Apple's Web browser on iPhones and computers:”
“The Journal mischaracterizes what happened and why.”
“We used known Safari functionality to provide features that signed-in Google users had enabled.”
Submitted by Scott Cleland on Tue, 2012-02-14 11:56
Google is battling law enforcement in the U.S. and around the world on three different legal battlefronts: antitrust, privacy and property. Why is it only Google that is under serious law enforcement investigation for so many different serious infractions in so many countries around the world? According to a top Google lawyer, “Google’s leadership does not care terribly much about precedent or law” per Stephen Levy’s book In The Plex. That very rare scofflaw attitude, combined with the vast amount of evidence cataloged below, strongly suggests Google is not the innocent victim it claims to be, but a dominant perpetrator of systematic violations of law around the globe.
Only Google is battling law enforcement around the globe with the defiant stance that:
Submitted by Scott Cleland on Tue, 2012-01-31 12:17
Why are market forces so weak in protecting users’ online privacy?
The main reason is that the online marketplace is economically structured around users being a commodity, data, to be aggregated and mined, not customers to be served and protected in a competitive marketplace. That’s because the overriding economic force that created the free and open commercial Internet – the predominant Silicon Valley venture capital/IPO value creation model – was and remains largely antithetical to protecting online privacy.
The Silicon Valley venture capital/IPO driven model is laser-focused on achieving Internet audience/user scale fastest in order to gain first-mover advantage and then rapid dominance of a new product or service segment. This predominant Internet economic model is predicated on a precious few investments achieving such rapid user scale that it: warrants a buy-out at an enormous premium multiple; enables fast and exceptionally-profitable liquidity (via the new secondary derivative market for private venture shares or employee options); or broad liquidity via a public IPO.
What is the essential critical element of achieving audience/user scale fastest? Free. No direct cost to the user fuels fastest, frictionless, viral adoption. This free economic model presupposes online advertising as an eventual monetization mechanism and shuns products and services directly paid for by the user because their inherent time-to-market is too slow and their upfront sunk cost of sales and customer service is too high for this predominant value creation model.
Submitted by Scott Cleland on Fri, 2012-01-27 19:12
Reports that “Twitter Can Censor by Country” is a perfect example of how the world is changing the Internet. Change is a two-way street. Conventional wisdom that only assumes the Internet is changing the world risks being blind-sided by the Internet’s underappreciated exa-trend: how the world is changing the Internet.
See my Forbes Tech Capitalist post: "Twitter Realpolitik & the Sovereignization of the Internet" to learn about Twitter's new realpolitik and how sovereign powers will increasingly be asserting themselves vis a vis the Internet.
Submitted by Scott Cleland on Tue, 2012-01-24 12:03
Google led, orchestrated, politically-framed and set the political tone for much of the Web’s opposition to pending anti-piracy legislation, SOPA/PIPA, because rule of law and effective enforcement of property rights online represent a clear and present danger to Google’s anti-property-rights mission, open philosophy, business model, innovation approach, competitive strategy, and culture.
Submitted by Scott Cleland on Wed, 2012-01-11 16:25
Submitted by Scott Cleland on Mon, 2011-12-12 13:59
Many thanks to Adam Thierer of the Technology Liberation Front, for selecting my book, Search & Destroy, as a top twenty most Important Cyber-Law & Info-Tech Policy books of 2011 because “it represented the beginning of an articulation of a philosophy of “cyber-conservatism.” I also thank Adam for his critical and insightful review of Search & Destroy, which clearly delineates his principled cyber-libertarian differences with my principled “cyber-conservative” views.
Submitted by Scott Cleland on Fri, 2011-12-09 10:15
The kerfuffle painting the Google Wallet App as an innocent victim of Verizon blocking -- in violation of an "open" Internet and net neutrality regulations -- completely misses the forest for the trees. This conflict revolves around two ongoing industry battles.
Submitted by Scott Cleland on Tue, 2011-11-15 12:19
In compiling and ranking the top threats facing Google, I was amazed at the breadth, depth, diversity and seriousness of the threats and liabilities facing Google.
Please see my Forbes Tech Capitalist post here to learn the ranking of what threats to Google are most serious and why.
Submitted by Scott Cleland on Fri, 2011-10-28 11:03
How could Google fail to meet the security needs of the City of Los Angeles in its trophy government cloud contract?
Learn why in my Forbes Tech Capitalist post here, entitled "Google Too Fast and Loose for LAPD."