"Tech City Map, created by developers at Trampoline Systems and designed by Playgen, pulls in streams of social network data for all of the businesses in the area to help analyse their influence. The Tech City Map follows in the footsteps of Matt Biddulph's original Silicon Roundabout map as well as Wired's very own version, produced in 2009."
(Olivia Solon and Nate Lanxon, 10 November 2011, Wired UK)
"Traditional marketing was built for another age. Today a new creative energy is required. Sociability is the media of now. Social connections happen everywhere, every minute of every day, in the real world and in the digital world. Social communication touches everybody. Brands are carried along in the stories people share, and the conversations they have, in social media, on their mobiles, and face to face. We help brands to get their stories to travel further and faster, building sustained relationships and advocacy as they go.
Our story began in a (thankfully converted) cowshed back in 2000. We saw that a new age of communication was emerging, an age of social communication. Since then we have worked with some of the world's best businesses helping them to behave in different ways; encouraging participation and collaboration with their audiences. We now have an 90–strong team of talented thinkers, doers and sometime dreamers who bring social communication to life for brands around the world."
"I take representing digital culture in film very seriously in lieu of having grown up in a world of very badly researched user interface greeble. I cringed during the part in Hackers (1995) when a screen saver with extruded 'equations' is used to signify that the hacker has reached some sort of neural flow or ambiguous destination. I cringed for Swordfish and Jurassic Park as well. I cheered when Trinity in The Matrix used nmap and ssh (and so did you). Then I cringed again when I saw that inevitably, Hollywood had decided that nmap was the thing to use for all its hacker scenes (see Bourne Ultimatum, Die Hard 4, Girl with Dragon Tattoo, The Listening, 13: Game of Death, Battle Royale, Broken Saints, and on and on). In Tron, the hacker was not supposed to be snooping around on a network; he was supposed to kill a process. So we went with posix kill and also had him pipe ps into grep. I also ended up using emacs eshell to make the terminal more l33t. The team was delighted to see my emacs performance –– splitting the editor into nested panes and running different modes. I was tickled that I got emacs into a block buster movie. I actually do use emacs irl, and although I do not subscribe to alt.religion.emacs, I think that's all incredibly relevant to the world of Tron."
(Joshua T. Nimoy)
"Xenu's Link Sleuth (TM) checks Web sites for broken links. Link verification is done on 'normal' links, images, frames, plug–ins, backgrounds, local image maps, style sheets, scripts and java applets. It displays a continously updated list of URLs which you can sort by different criteria. A report can be produced at any time."
(Tilman Hausherr, 2010)
"According to the 'long tail' principle, ICT innovations in content creation and distribution such as virtual inventories, Internet Protocol Television (IPTV) and other types of video on demand, music self–publishing in social networking sites and digital printing challenge old rationales that justified the adoption of mass–market models for the production and publication of cultural goods. These technologies dissolve the spatial and physical constraints which limited the range of creative content goods available in the market and open the gates for a flood of new (and old) media. In doing so they have created a new problem, of a navigational nature: in principle, diversity enables access to content goods better suited to a customer's preferences, but it also makes finding them more difficult (194).
The main reason for the success of Google's search services has been its ability to address Internet users' need for relevant resources, by adopting a scalable algorithm that establishes a webpage's rank according to its reputation. However, its user interface is still too rigid and makes it difficult, for example, to fully specify the type of content a user is looking for. Additionally, this technique, based on a 'Wisdom of the Masses' perception of the web, can in some cases promote content perceived to be useless over content perceived as useful, and be tampered with through search optimisation techniques such as link farming (195)."
(Juan Mateos–Garcia, Aldo Geuna and W. Edward Steinmueller, 2008, p.85)
194: In a context where information is abundant, attention becomes the scarce resource (Simon, H. A. 1971, 'Designing Organizations for an Information–Rich World', in Martin Greenberger, Computers, Communication, and the Public Interest, Baltimore, MD: The Johns Hopkins Pres).
195: i.e. exchanging reciprocal links with web sites in order to increase search engine optimization, as search engines often rank sites according to, among other things, the quantity of sites that link to them.
Fig.1 Perry Ogden (2003). 'Bono with Louis Le Brocquy'.
2). Fabienne Abadie, Ioannis Maghiros, and Corina Pascu (editors) 2008 'The Future Evolution of the Creative Content Industries: Three Discussion Papers', Office for Official Publications of the European Communities, EUR 23633 EN – 2008