Do you need to raise substantial amounts capital?
Commonwealth Capital has created the Sprocket Network™ to help cultivate quality deal flow for their V. C. Fund, Commonwealth Capital Income Fund - I & II.
What can Sprocket Network™ do for you?
Sprocket can help you become more appealing to investors, partners, management and sales distribution channels.
The Sprocket Network™ will take you on a journey of engineering your start-up or early stage company in a manner that mitigates operatio
social (54)
Globalization and Social Inequality: Obscene Wealth of Eight Mega-Billionaires
The super-wealth of an elite eight equals a staggering $427 billion – as much as humanity’s 3.6 billion poorest, struggling daily to survive, many not making it.
Oxfam highlighted unprecedented global inequality, threatening social stability. The chasm between super-rich and desperate poor is obscene. Instead of abating, wealth disparity is increasing, Oxfam explaining:
Designing the Future by Applying System Dynamics Thinking
Presentation Based on the Work of Founder Dr. Jay W. Forrester
Understanding System Behavior by Identifying System Structure
Systems in Technology and Society
• Everyone speaks of systems: computer systems, air traffic control systems, economic systems, and social systems. However, few people realize that systems exist everywhere. Systems influence everything we do. Systems create the puzzling difficulties that confront us every day.
•Understa
Think about hackers breaking into accounts. If you think they need top-notch computer skills, you would be wrong. These days, instead of requiring skills behind a keyboard, hackers generally rely on strategy…specifically a strategy called social engineering. This means that hackers don’t have to be technical, but they DO have to be clever and crafty because they are essentially taking advantage of people and “tricking” them into giving information.
There are four main ways that hackers use social
More than just a venture fund or business catalyst, Sprocket allows startups and early stage companies to leverage the power of the crowd.
Sprocket is the "missing link" in the support of startup and early stage companies. When investors invest, they want to know what kind of safeguards the venture has in place to mitigate risk of loss. When you have what's called "social proof", you help mitigate that risk. Sprocket is the platform to gain social support, and proof for your idea, startup or e
Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other kids who just want to be cruel bullies.
Parents should have informative discussions with their kids about the various apps out there. And it’s okay to forbid particular apps you aren’t comfortable with. Like Musicly, search “
Looks like there’s some worms in Apple.
Not too long ago, dozens and dozens of iPhones were stolen from two Apple stores. How could this happen, what with Apple’s security? Simple: The thieves wore clothes similar to Apple store employees and obviously knew the innards of the stores.
They sauntered over to the drawers that held the new phones, acting nonchalant to avoid attracting attention. In fact, a new face in Apple attire at one of the stung locations wouldn’t raise eyebrows since new employe
The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users.
Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of data from other breached sources. Or, they could have used malware to steal passwords off of devices.
Nevertheless, the end result meant that for many Twitter accounts, there was password exposure—l
We Don't Need Leaders, We Need Good Ideas
Enrique Suarez Presenting:
Mondragon: A Company Without Owners
The Basic Principles of the MONDRAGON Co-operative Experience were approved at our first Co-operative Congress held in October 1987. They include a set of ideas forged over more than 30 years of operation as a co-operative, and are set out below in a condensed version:
Open admission
The MONDRAGON co-operative experience is open to all men and women who accept these Basic Principles without any
Yes, believe it or not, you CAN get by in life with a wallet that just has a little cash, a store card or two, one to two credit cards and your ID. Unless you absolutely need your insurance card or Social Security card, leave those items at home.
For years now, wallets have been on the market that you can stuff everything into, save for the kitchen sink. This doesn’t mean you must carry a ridiculous bulging wallet everywhere you go.
Now you may not mind having to dig through your wallet for five m
Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS!
The Giants: Facebook and Twitter
- Be careful what you post on Facebook and tweet about. It can be used against you in court, even something as innocuous as: “I’m training for my very first 10K.” Not good if you’re suing someone who hit your car for back pain and suffering.
- Lawyers will
Capitalism at Work. Widespread Hardship: “What’s More Important? The Dignity of Women or another Billion Dollars for the Banksters”?
Source:
Dr. Paul Craig Roberts
Global Research, November 29, 2015
Zero Hedge reports a story from “Keep Talking Greece” that first appeared in The Times.
According to the story, the plummeting living standards forced on the Greek people by German chancellor Merkel and the European banks have forced large numbers of young Greek women into prostitution.
The large increas
LinkedIn is a free service that allows professional people to network with each other. Often, a LinkedIn member will receive an e-mail from another LinkedIn member “inviting” them to join their network. Sometimes, the inviter is someone the recipient doesn’t know, but the recipient will link up anyways. And that’s the problem.
A report at www.secureworks.com says that Dell SecureWorks Counter Threat Unit™ (CTU) researchers discovered 25 phony LinkedIn profiles.
With this particular phony network (
The 2015 Social Media Glossary: 207 Essential Definitions
Source:
Dara Fontein
Hootsuite
Dara is a Blog Writer at Hootsuite. She writes about social media, technology, and Hootsuite happenings.
A lot can change in a year, especially in the world of social media. It can be difficult to keep up with all of the terms and slang used with the introduction of new technologies and platforms, so we decided it was time to update our Social Media Glossary. Like previous editions of the glossary, this is a livi
So, when you think about summer travel safety, what comes to mind? Which beach you’ll be lounging on? Sunburns? Shark attacks? While sunburns and vacation plans are rational concerns most have when traveling during the summer, shark attacks are a new one.
With all of the news of recent shark attacks, people are now anxious about wading into the waters, despite the fact that the chances of getting mauled by a shark are a whopping one in 3.7 million. No guarantees, of course, but your odds are look
Enrique Suarez Presenting:
“Buying Countries”, No Capital Controls for Oligarchs: Billionaire Warren Buffett Buys Greek Island
Source:
Michael Krieger
Global Research, July 22, 2015
If you want to see what unrestrained parasitic financial oligarchy ultimately looks like, look no further than the humanitarian crisis in Greece turned unprecedented billionaire opportunity. With global wealth becoming systemically concentrated in the hands of “insiders,” empty flats bought for tens of
Social media is a conduit for thieves to get personal data (they can use it, for instance, to open up a credit line in the victim’s name). Though many people are concerned their personal information will get in the wrong hands, the funny thing is that they continue posting personal information—way too personal.
The FBI’s Internet Crime Complaint Center says that social media is a fertile area for criminals to scam people.
Phishing
You are lured to a phony website that masquerades as your bank or so
When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
- Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but “Jaycina McArthur” just might. What comes up?
- See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every legitimate person is into the social media thing.
Here are
With all the increased news coverage of kids running off with adults they met online, and kids dying by suicide supposedly due to online bullying, many parents are wondering if their worries about their kids being online are justified.
We hardly hear about how social media has benefited kids. There’s nothing inherent about electronic communications or electronic media that makes it bad for kids. There will always be bad people out there—online and offline.
An article on commonsensemedia.org lists
Enrique Suarez Presenting:
Pillage and Class Polarization: The Rise of “Criminal Capitalism”
Source:
Prof. James Petras
About 75% of US employees work 40 hours or longer, the second longest among all OECD countries, exceeded only by Poland and tied with South Korea. In contrast, only 10% of Danish workers, 15% of Norwegian, 30% of French, 43% of UK and 50% of German workers work 40 or more hours. With the longest work day, US workers score lower on the ‘living well’ s