This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Will you validate new members’ email addresses and/or phone numbers? How much member profile information do you need before allowing a user to register? Social Integration/Viral Outreach Is your application tied into any social networks? How are you using geographic information? For customer service?
Intros.They’re the lifeblood of networking – the currency of mavens. And in most cases I would heed Fred Wilson’s advice about the “double opt-in” email for intros – where you ask for permission before green-lighting an unsolicited introductions. They are your route to angel money.
Social Networks: Past, Present & Future. I recently spoke at Caltech at the Caltech / MIT Enterprise Forum on “the future of social networking,&# the 30-minute video is here and the PowerPoint presentation is here on DocStoc ). What are the big trends that will drive the next phase of social networks?
I recently spoke at Caltech at the Caltech / MIT Enterprise Forum on “the future of social networking,&# the 30-minute video is here and the PowerPoint presentation is here on DocStoc ). What are the big trends that will drive the next phase of social networks? And so it goes with social networking. The Past (1985-2002).
Design Challenge In this particular web site, we needed to get the user's email (and password). We also wanted users to provide information about twitter and LinkedIn to help personalize the application. Mahalo offers you the choice of sign-up / registration via a host of social networks (powered by JanRain). Email Address.
I was waiting for my son’s basketball game to start this morning and with the morning’s emails all drained I turned to Twitter and saw this Tweet from Marshall Kirkpatick. You want to say something informed. Test: open your twitter stream, look at the 1st item in it, think of something to say in response, say it.
Photo by Juliette F on Unsplash Networking is a critical part of relationship building and there is no event more valuable to building relationships than the proverbial “breaking of bread” with people. You should allow a period for general networking, a chance to eat your first bites of food and some casual catch ups. It matters.
Do you need to round trip an email to validate the email? How much member profile information do you need before allowing a user to login? Social Integration/Viral Outreach - are you integrating in some way with social networks? Cloudsponge for email invites to large group? Member Profiles - What data is included?
Our profile this morning is with Network Automation , a Los Angeles company competing in the IT automation market. Southern California--despite the lack of huge, name brand firms-- has a significant number of enterprise software companies, of which Network Automation is just one. You are self funded too, we recall.
Do you need to round trip an email to validate the email? How much member profile information do you need before allowing a user to login? Social Integration/Viral Outreach - are you integrating in some way with social networks? Cloudsponge for email invites to large group? Member Profiles - What data is included?
Or that you are a cell phone company with a multi–billion record log file of every call made from every location to every number dialed using your network. Adding context to data takes this information and creates actionable knowledge. That’s data dense with information that is useful. Big data without context is useless.
Costs of product on YouTube content is literally 99% cheaper than traditional TV and; Distribution of content can now go viral and can predictably distributed via social networks. For the first time in history content producers can build a direct relationship with views through subscribers, email addresses and mobile phone number.
I’m not an advisor & I’m not privy to any internal information at your company, I have no right to tell you what to do. I use you more than email now. I hate email, by the way. Hell, even cable operators do that when they have disputes with networks. Even writing this could hurt me. I love you, man.
Social media and email marketing act separately as great marketing tools. While social media offers a continuous interaction with your followers, email marketing is a tool to provide a steady flow of information received directly by your connections. www.BreakThroughNetworking.org.
And as I’ve written about in the past, I truly believe that Twitter networks are significantly different from other social networks. For me, when I use Twitter on my Blackberry I email the Tweet to my gmail account and I read them later. How do you deal with this scenario? That way they could support both use cases.
After we typed the first two letters from our computer room at UCLA, namely, “Lo” for “Login,” the network crashed. How did a medium created for sharing data and information turn into such a mixed blessing of questionable information? We are currently still suffering from those shifts.
It should stick in your head as a metaphor for networking. You send them update emails. You know the drill – “informational interview.&# Life is an informational interview. 50 coffee meetings. For getting outside of your comfort zone. For starting relationships today that won’t pay off for a year.
In my last post I pointed out that many of the media commentators who have criticized the YouTube video network companies as not having strong businesses were mistaken. Much of network television can cost $100,000 / minute to produce. It’s why many talent agencies or ad networks struggle to get scale advantages.
According to a study from network security firm PhishMe , ransomware is delivered by 97% of phishing emails. Detection : identify new threats with “detection points that span all the access vectors (email, Web, Internet points of presence, etc.).”. Improve your information security with ISO 27001.
However, that process really hasn''t taken advantage of today''s mobile, always-connected, socially networked world. It''s meant to help moms get stuff done quickly, by leveraging their network. interview parents parenting mothering mothers service recommend startup referral network csod cornerstone momstamp miller staci'
The volume of Tweets is enormous and growing at a rapid pace so tools are emerging to help brands manage this information. On Facebook (and nearly all social networks that preceded it) the relationship was always reciprocal – if I accept your invitation to follow me then I have to follow you.
Our “hot deal of the week&# turned out to be more of the “hot theme of the week.&# P2P lending networks are revived and brought it a whopping $40 million in investments announced recently. The idea is that in a world in which companies need to deal with customer support requests from Twitter, Facebook, email, phone, IM, etc.
From there, you will generally see a pop-up dialog similar to the following (this one is from CitySearch): Once you click Connect, the original site now knows that I’m Tony Karrer from Facebook and the various demographic and friend information from Facebook. do not provide access to the email address. Take a look at Startup Metrics.
A California-based medical startup that provides COVID-19 testing across Los Angeles has pulled down a website it used to allow customers to access their test results after a customer found a vulnerability that allowed access to other people’s personal information.
When I first read this post I immediately filed away in memory that there was important information to impart on entrepreneurs and led to this post. Then I get people sending me Twitter comments, blog comments and tons & tons of email intros. How to (re) intro yourself. 80% of the people never do. The Rolls Royce of meeting.
Visit to purchase, click to close, or other terms are used in various industries to describe the measure of conversion rate from initial landing on a page displaying purchase information about a product or service.
I never thought that networking could take over my life the way it did. Within the past two years, I discussed the topic of networking with multiple people and I received generous feedback from the attendees of my workshops and training sessions. The following are three major steps of the networking process: #1 Pre-Planning.
I recently wrote a post about how to get access to people at conferences and how to connect with people on social networks. I got to thinking more broadly about social networks and the real-time web. Facebook has much more value to me as a networking tool. I’ve been thinking a lot about comments lately. It is threaded.
It was a break from information overload of Facebook. My friends said, “I don’t need another network. That’s what happens when you join a network and have kids. Here’s the thing: If you never try new product and new networks you’ll never learn anything. Right now it’s my favorite network. I already have Facebook.”.
Dave’s note: Our guest author this week is Kevin McDonald, Executive Vice President and Chief Information Security Officer at Alvaka Networks, a network services and security firm in Irvine, California. Email readers, continue here…] Some attacks are rudimentary, but watch it! By Kevin McDonald.
Use Feedburner or Feedblitz for Email. Sign up with either Feedburner or Feedblitz to provide email subscriptions to your blog. Send email to other bloggers when you post a really good post. And make sure you spend time visible networking. Put yourself in the middle of a blog network. Engage other Bloggers.
San Diego-based Sony Online Entertainment , the developer of massively multiplayer online games, has provided details of the intrusion on the firm's systems, saying that hackers may have stolen its customer information. The revelation follows last week's hacking of Sony's PlayStation Network and other services. READ MORE>>.
Email readers, continue here.] Here it is, not so many years later, and the signs are more subtle yet, but the speed of obsolescence is much faster. With rapid sharing of information and recommendations, a fickle public can change its mass preferences seemingly in an instant.
I recently received an email from a former student in which he described how he was able to secure a lunch meeting with a high-profile entrepreneur who is operating multiple ventures in parallel. I wasn''t surprised by Benedikt''s email, as I was aware of his confidence and politely aggressive personality. Humility & Empathy.
I’ve weighed in on: Email 1 — How to Get Busy People to Take Action Email 2 — Etiquette to Email Introductions Email 3 — Make it Easy for Me to Forward Your Email ! If you want somebody to action email one person and make it clear whom you’re asking. If you want to inform somebody — great!
You’ve informed your top management of the pending deal and they know they will be impacted and are a bit skittish. If you’re seeing this movie for the first time from the top, you need to ask many questions and be led by your outside team, whether legal, financial, accounting, or networking – or all. Email readers, continue here.]
A new, Los Angeles startup At The Pool , headed by Alex Capecelatro, has started letting users sign on to the service, helping to match them based on their location, interests, and other information. The startup said its first, public pool, "siliconbeach", is aimed at locals in the Silicon Beach area. READ MORE>>.
Do make sure to get their contact information and right then and there send them a follow up email, facebook/linkedin request, twitter shout out and you’ll meaningfully increase your odds of staying in touch. • Take the time to introduce people that might be able to work together, are looking for jobs, or could be co-founders.
If so, you need to do a better job of communicating between meetings so that they always feel well informed. They network with other VC’s, other startups CEOs, larger industry players, journalists, potential executives looking for their next jobs, service providers such as venture debt providers, etc. Here’s how: Intros.
The ten companies selected for the programe are: • AccessDNA : – Think WebMD for genetic information. As our knowledge of the human genome expands and our appetite for genetic information grows exponentially I think the team here is going to rock it. AwesomeBox : AwesomeBox is currently in stealth mode so I’ll respect that.
Vivek Wadwha - Campus Entrepreneurship , November 19, 2010 Best Practices for Introduction Emails - Israel Venture Capital 2.0 , March 25, 2010 Weekend Reading - The Mogul Mom , October 1, 2010 Make informal advisors part of the team. Berkonomics , November 29, 2010 Rice Alliance IT/Web 2.0
Much of the rest of the presentation is devoted to explaining to the group the causes for the concerns and offering information for the group to use in the feedback session to help the CEO seek solutions and to provide resources to the CEO for that purpose.
Email readers, continue here.] They told me all about why this is such a good idea: hard to manage price discovery in the commercial real estate market; fragmented information about vacancies obtained from landlords and brokers; and the large scale of transactions. They wanted to come to pitch to my angel network.
High profile entrepreneur Jason Calacanis, CEO of Los Angeles-based Mahalo , emailed an impassioned note to his mailing list Thursday, which he also posted to his personal blog, detailing how one of the firm's employees has just been sentenced to 48 months in jail for computer hacking.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content