Big profile of @Pmarca in The New Yorker last weekend:
“…I’ve been totally determined to be on the other side of that dynamic by being here, because success in software follows a power-law distribution. It’s not Coke and Pepsi and a bunch of others; it’s winner take all. Second prize is a set of steak knives, and third prize is you’re fired.” – Marc Andreessen
Every company is becoming a tech/software company these days. What people are ignoring is that software markets have a tendency to become winner-take-all or winner-takes-most markets. Traditional Michael Porter style “competing” doesn’t necessarily transfer.
SOURCE: A New Intelligence Technique for Analyzing Complex Adaptive Systems: A Case Based Assessment, by Sarah Miller Beebe. March 2011 International Studies Association Annual Conference.
“For the past three decades, hackers have done a lot of things, but they have also impacted civil liberties, innovation and Internet freedom, so I think it’s time we take a good look at how we choose to portray them, because if we keep expecting them to be the bad guys, how can they be the heroes too? My years in the hacker world have made me realize both the problem and the beauty about hackers: They just can’t see something broken in the world and leave it be. They are compelled to either exploit it or try and change it, and so they find the vulnerable aspects in our rapidly changing world. They make us, they force us to fix things or demand something better, and I think we need them to do just that, because after all, it is not information that wants to be free, it’s us.”
Vendors in the News
(DataFox) – Using Artificial Intelligence to Uncover Non-Public Company Data
(Quid) – Journey Through the Brain: MIT Neurotech
(Aylien) – Aylien’s new natural-language add-on lets you analyze (and summarize) text in Google Drive
(IBM Watson) – Mining the Medical Literature Explosion
(Luminoso) – The Best and Worst Airlines — According to Twitter
(Digital Reasoning) – Machine Learning Platform Slices and Dices Human Chatter for Insider Threat Detection