Too many businesses judge an employee’s performance by hours worked
rather than by value created. It's time to get with the program and
understand that "face time" is beyond overrated.
Accolades to Robert Pozen of The New York Times
who, yet again, brings up the fact too many businesses judge an
employee’s performance by hours worked rather than by value created. As a
result, workers who complete their tasks faster wind up
procrastinating, surfing the Web, or rereading emails long after the
clock strikes five, simply in order to be seen in the office.
Studies suggest that workers are right to believe they are better off
sticking around to avoid getting labeled as slackers. Managers in one
recent study described employees seen in the office as “dependable” and
“reliable,” and those who came in over the weekend as “committed” and
“dedicated.” These reactions are unfortunate “remnants of the industrial
age,” when hours logged on the assembly line translated directly into
more products.
But measuring performance by hours worked “makes no sense for
knowledge workers” in the 21st century, and bosses who implicitly reward
those who stay late “are undermining incentives for workers to be
efficient.” Many organizations will struggle with learning to focus on
results rather than hours. But if you can convince your boss to make
that switch, it “will help you accomplish more at work”—and that’s
something any boss can value.
- As seen in The Week
Brought to you by NetLingo: Improve Your Internet IQ
Subscribe to the NetLingo Blog via Email or RSS here!
Happy New Year: Now Measure My Results, Not My Hours
My Digital Nightmare: A Hacker Stole My Family Photos and Upended My Life, and It Could Easily Happen to You
In the space of one hour, my entire digital life was destroyed, said Mat Honan of Wired.
"First my Google account was taken over, then deleted. Next my Twitter
account was compromised, and used as a platform to broadcast racist and
homophobic messages. And worst of all, my AppleID account was broken
into, and my hackers used it to remotely erase all of the data on my
iPhone, iPad, and MacBook.
In many ways, this was all my fault.
My accounts were daisy-chained together. Getting into Amazon let my
hackers get into my Apple ID account, which helped them get into Gmail,
which gave them access to Twitter. Had I used two-factor authentication
for my Google account, it’s possible that none of this would have
happened, because their ultimate goal was always to take over my Twitter
account and wreak havoc. Lulz.
Had I been regularly backing up
the data on my MacBook, I wouldn’t have had to worry about losing more
than a year’s worth of photos, covering the entire lifespan of my
daughter, or documents and e-mails that I had stored in no other
location.
Those security lapses are my fault, and I deeply, deeply regret them.
But
what happened to me exposes vital security flaws in several customer
service systems, most notably Apple’s and Amazon’s. Apple tech support
gave the hackers access to my iCloud account. Amazon tech support gave
them the ability to see a piece of information — a partial credit card
number — that Apple used to release information. In short, the very four
digits that Amazon considers unimportant enough to display in the clear
on the web are precisely the same ones that Apple considers secure
enough to perform identity verification. The disconnect exposes flaws in
data management policies endemic to the entire technology industry, and
points to a looming nightmare as we enter the era of cloud computing
and connected devices.
This isn’t just my problem. Since Friday,
Aug. 3, 2012, when hackers broke into my accounts, I’ve heard from other
users who were compromised in the same way, at least one of whom was
targeted by the same group. The very four digits that Amazon considers
unimportant enough to display in the clear on the Web are precisely the
same ones that Apple considers secure enough to perform identity
verification.
Moreover, if your computers aren’t already
cloud-connected devices, they will be soon. Apple is working hard to get
all of its customers to use iCloud. Google’s entire operating system is
cloud-based. And Windows 8, the most cloud-centric operating system
yet, will hit desktops by the tens of millions in the coming year. My
experience leads me to believe that cloud-based systems need
fundamentally different security measures. Password-based security
mechanisms — which can be cracked, reset, and socially engineered — no
longer suffice in the era of cloud computing.
I realized
something was wrong at about 5 p.m. on Friday. I was playing with my
daughter when my iPhone suddenly powered down. I was expecting a call,
so I went to plug it back in.
It then rebooted to the setup
screen. This was irritating, but I wasn’t concerned. I assumed it was a
software glitch. And, my phone automatically backs up every night. I
just assumed it would be a pain in the ass, and nothing more. I entered
my iCloud login to restore, and it wasn’t accepted. Again, I was
irritated, but not alarmed.
I went to connect the iPhone to my
computer and restore from that backup — which I had just happened to do
the other day. When I opened my laptop, an iCal message popped up
telling me that my Gmail account information was wrong. Then the screen
went gray, and asked for a four-digit PIN.
I didn’t have a four-digit PIN.
By
now, I knew something was very, very wrong. For the first time it
occurred to me that I was being hacked. Unsure of exactly what was
happening, I unplugged my router and cable modem, turned off the Mac
Mini we use as an entertainment center, grabbed my wife’s phone, and
called AppleCare, the company’s tech support service, and spoke with a
rep for the next hour and a half.
It wasn’t the first call they
had had that day about my account. In fact, I later found out that a
call had been placed just a little more than a half an hour before my
own. But the Apple rep didn’t bother to tell me about the first call
concerning my account, despite the 90 minutes I spent on the phone with
tech support. Nor would Apple tech support ever tell me about the first
call voluntarily — it only shared this information after I asked about
it. And I only knew about the first call because a hacker told me he had
made the call himself.
At 4:33 p.m., according to Apple’s tech
support records, someone called AppleCare claiming to be me. Apple says
the caller reported that he couldn’t get into his Me.com e-mail — which,
of course was my Me.com e-mail.
In response, Apple issued a
temporary password. It did this despite the caller’s inability to answer
security questions I had set up. And it did this after the hacker
supplied only two pieces of information that anyone with an internet
connection and a phone can discover.
At 4:50 p.m., a password
reset confirmation arrived in my inbox. I don’t really use my me.com
e-mail, and rarely check it. But even if I did, I might not have noticed
the message because the hackers immediately sent it to the trash. They
then were able to follow the link in that e-mail to permanently reset my
AppleID password.
At 4:52 p.m., a Gmail password recovery e-mail
arrived in my me.com mailbox. Two minutes later, another e-mail arrived
notifying me that my Google account password had changed.
At
5:02 p.m., they reset my Twitter password. At 5:00 they used iCloud’s
“Find My” tool to remotely wipe my iPhone. At 5:01 they remotely wiped
my iPad. At 5:05 they remotely wiped my MacBook. Around this same time,
they deleted my Google account. At 5:10, I placed the call to AppleCare.
At 5:12 the attackers posted a message to my account on Twitter taking
credit for the hack.
By wiping my MacBook and deleting my Google
account, they now not only had the ability to control my account, but
were able to prevent me from regaining access. And crazily, in ways that
I don’t and never will understand, those deletions were just collateral
damage. My MacBook data — including those irreplaceable pictures of my
family, of my child’s first year and relatives who have now passed from
this life — weren’t the target. Nor were the eight years of messages in
my Gmail account. The target was always Twitter. My MacBook data was
torched simply to prevent me from getting back in.
Lulz.
I
spent an hour and a half talking to AppleCare. One of the reasons it
took me so long to get anything resolved with Apple during my initial
phone call was because I couldn’t answer the security questions it had
on file for me. It turned out there’s a good reason for that. Perhaps an
hour or so into the call, the Apple representative on the line said
“Mr. Herman, I….”
“Wait. What did you call me?”
“Mr. Herman?”
“My name is Honan.”
Apple
had been looking at the wrong account all along. Because of that, I
couldn’t answer my security questions. And because of that, it asked me
an alternate set of questions that it said would let tech support let me
into my me.com account: a billing address and the last four digits of
my credit card. (Of course, when I gave them those, it was no use,
because tech support had misheard my last name.)
It turns out, a
billing address and the last four digits of a credit card number are the
only two pieces of information anyone needs to get into your iCloud
account. Once supplied, Apple will issue a temporary password, and that
password grants access to iCloud.
Apple tech support confirmed to
me twice over the weekend that all you need to access someone’s AppleID
is the associated e-mail address, a credit card number, the billing
address, and the last four digits of a credit card on file. I was very
clear about this. During my second tech support call to AppleCare, the
representative confirmed this to me. “That’s really all you have to have
to verify something with us,” he said.
We talked to Apple
directly about its security policy, and company spokesperson Natalie
Kerris told Wired, “Apple takes customer privacy seriously and requires
multiple forms of verification before resetting an Apple ID password. In
this particular case, the customer’s data was compromised by a person
who had acquired personal information about the customer. In addition,
we found that our own internal policies were not followed completely. We
are reviewing all of our processes for resetting account passwords to
ensure our customers’ data is protected.”
On Monday, Wired tried
to verify the hackers’ access technique by performing it on a different
account. We were successful. This means, ultimately, all you need in
addition to someone’s e-mail address are those two easily acquired
pieces of information: a billing address and the last four digits of a
credit card on file. Here’s the story of how the hackers got them.
By
exploiting the customer service procedures employed by Apple and
Amazon, hackers were able to get into iCloud and take over all of Mat
Honan’s digital devices — and data.
On the night of the hack, I
tried to make sense of the ruin that was my digital life. My Google
account was nuked, my Twitter account was suspended, my phone was in a
useless state of restore, and (for obvious reasons) I was highly
paranoid about using my Apple email account for communication.
I
decided to set up a new Twitter account until my old one could be
restored, just to let people know what was happening. I logged into
Tumblr and posted an account of how I thought the takedown occurred. At
this point, I was assuming that my seven-digit alphanumeric AppleID
password had been hacked by brute force. In the comments (and, oh, the
comments) others guessed that hackers had used some sort of keystroke
logger. At the end of the post, I linked to my new Twitter account.
And then, one of my hackers @ messaged me. He would later identify himself as Phobia. I followed him. He followed me back.
We
started a dialogue via Twitter direct messaging that later continued
via e-mail and AIM. Phobia was able to reveal enough detail about the
hack and my compromised accounts that it became clear he was, at the
very least, a party to how it went down. I agreed not to press charges,
and in return he laid out exactly how the hack worked. But first, he
wanted to clear something up:
“didnt guess ur password or use bruteforce. i have my own guide on how to secure emails.”
I
asked him why. Was I targeted specifically? Was this just to get to
Gizmodo’s Twitter account? No, Phobia said they hadn’t even been aware
that my account was linked to Gizmodo’s, that the Gizmodo linkage was
just gravy. He said the hack was simply a grab for my three-character
Twitter handle. That’s all they wanted. They just wanted to take it, and
fuck shit up, and watch it burn. It wasn’t personal.
“I honestly
didn’t have any heat towards you before this. i just liked your
username like I said before” he told me via Twitter Direct Message.
After
coming across my account, the hackers did some background research. My
Twitter account linked to my personal website, where they found my Gmail
address. Guessing that this was also the e-mail address I used for
Twitter, Phobia went to Google’s account recovery page. He didn’t even
have to actually attempt a recovery. This was just a recon mission.
Because
I didn’t have Google’s two-factor authentication turned on, when Phobia
entered my Gmail address, he could view the alternate e-mail I had set
up for account recovery. Google partially obscures that information,
starring out many characters, but there were enough characters
available, m••••n@me.com. Jackpot.
This was how the hack
progressed. If I had some other account aside from an Apple e-mail
address, or had used two-factor authentication for Gmail, everything
would have stopped here. But using that Apple-run me.com e-mail account
as a backup meant told the hacker I had an AppleID account, which meant I
was vulnerable to being hacked.
Be careful with your Amazon account — or someone might buy merchandise on your credit card, but send it to their home.
“You
honestly can get into any email associated with apple,” Phobia claimed
in an e-mail. And while it’s work, that seems to be largely true.
Since
he already had the e-mail, all he needed was my billing address and the
last four digits of my credit card number to have Apple’s tech support
issue him the keys to my account.
So how did he get this vital
information? He began with the easy one. He got the billing address by
doing a whois search on my personal web domain. If someone doesn’t have a
domain, you can also look up his or her information on Spokeo,
WhitePages, and PeopleSmart.
Getting a credit card number is
tricker, but it also relies on taking advantage of a company’s back-end
systems. Phobia says that a partner performed this part of the hack, but
described the technique to us, which we were able to verify via our own
tech support phone calls. It’s remarkably easy — so easy that Wired was
able to duplicate the exploit twice in minutes.
First you call
Amazon and tell them you are the account holder, and want to add a
credit card number to the account. All you need is the name on the
account, an associated e-mail address, and the billing address. Amazon
then allows you to input a new credit card. (Wired used a bogus credit
card number from a website that generates fake card numbers that conform
with the industry’s published self-check algorithm.) Then you hang up.
Next
you call back, and tell Amazon that you’ve lost access to your account.
Upon providing a name, billing address, and the new credit card number
you gave the company on the prior call, Amazon will allow you to add a
new e-mail address to the account. From here, you go to the Amazon
website, and send a password reset to the new e-mail account. This
allows you to see all the credit cards on file for the account — not the
complete numbers, just the last four digits. But, as we know, Apple
only needs those last four digits. We asked Amazon to comment on its
security policy, but didn’t have anything to share by press time.
And
it’s also worth noting that one wouldn’t have to call Amazon to pull
this off. Your pizza guy could do the same thing, for example. If you
have an AppleID, every time you call Pizza Hut, you’ve giving the
16-year-old on the other end of the line all he needs to take over your
entire digital life.
And so, with my name, address, and the last
four digits of my credit card number in hand, Phobia called AppleCare,
and my digital life was laid waste. Yet still I was actually quite
fortunate.
They could have used my e-mail accounts to gain access
to my online banking, or financial services. They could have used them
to contact other people, and socially engineer them as well. As Ed Bott
pointed out on TWiT.tv, my years as a technology journalist have put
some very influential people in my address book. They could have been
victimized too.
Instead, the hackers just wanted to embarrass me, have some fun at my expense, and enrage my followers on Twitter by trolling.
I had done some pretty stupid things. Things you shouldn’t do.
I
should have been regularly backing up my MacBook. Because I wasn’t
doing that, if all the photos from the first year and a half of my
daughter’s life are ultimately lost, I will have only myself to blame. I
shouldn’t have daisy-chained two such vital accounts — my Google and my
iCloud account — together. I shouldn’t have used the same e-mail prefix
across multiple accounts — mhonan@gmail.com, mhonan@me.com, and
mhonan@wired.com. And I should have had a recovery address that’s only
used for recovery without being tied to core services.
But,
mostly, I shouldn’t have used Find My Mac. Find My iPhone has been a
brilliant Apple service. If you lose your iPhone, or have it stolen, the
service lets you see where it is on a map. The New York Times’ David
Pogue recovered his lost iPhone just last week thanks to the service.
And so, when Apple introduced Find My Mac in the update to its Lion
operating system last year, I added that to my iCloud options too.
After all, as a reporter, often on the go, my laptop is my most important tool.
But
as a friend pointed out to me, while that service makes sense for
phones (which are quite likely to be lost) it makes less sense for
computers. You are almost certainly more likely to have your computer
accessed remotely than physically. And even worse is the way Find My Mac
is implemented.
When you perform a remote hard drive wipe on
Find my Mac, the system asks you to create a four-digit PIN so that the
process can be reversed. But here’s the thing: If someone else performs
that wipe — someone who gained access to your iCloud account through
malicious means — there’s no way for you to enter that PIN.
A
better way to have this set up would be to require a second method of
authentication when Find My Mac is initially set up. If this were the
case, someone who was able to get into an iCloud account wouldn’t be
able to remotely wipe devices with malicious intent. It would also mean
that you could potentially have a way to stop a remote wipe in progress.
But that’s not how it works. And Apple would not comment as to whether stronger authentification is being considered.
As
of Monday, both of these exploits used by the hackers were still
functioning. Wired was able to duplicate them. Apple says its internal
tech support processes weren’t followed, and this is how my account was
compromised. However, this contradicts what AppleCare told me twice that
weekend. If that is, in fact, the case — that I was the victim of Apple
not following its own internal processes — then the problem is
widespread.
I asked Phobia why he did this to me. His answer
wasn’t satisfying. He says he likes to publicize security exploits, so
companies will fix them. He says it’s the same reason he told me how it
was done. He claims his partner in the attack was the person who wiped
my MacBook. Phobia expressed remorse for this, and says he would have
stopped it had he known.
“yea i really am a nice guy idk why i do
some of the things i do,” he told me via AIM. “idk my goal is to get it
out there to other people so eventually every1 can over come hackers”
I
asked specifically about the photos of my little girl, which are, to
me, the greatest tragedy in all this. Unless I can recover those photos
via data recovery services, they are gone forever. On AIM, I asked him
if he was sorry for doing that. Phobia replied, “even though i wasnt the
one that did it i feel sorry about that. Thats alot of memories im only
19 but if my parents lost and the footage of me and pics i would be
beyond sad and im sure they would be too.”
But let’s say he did
know, and failed to stop it. Hell, for the sake of argument, let’s say
he did it. Let’s say he pulled the trigger. The weird thing is, I’m not
even especially angry at Phobia, or his partner in the attack. I’m
mostly mad at myself. I’m mad as hell for not backing up my data. I’m
sad, and shocked, and feel that I am ultimately to blame for that loss.
But
I’m also upset that this ecosystem that I’ve placed so much of my trust
in has let me down so thoroughly. I’m angry that Amazon makes it so
remarkably easy to allow someone into your account, which has obvious
financial consequences. And then there’s Apple. I bought into the Apple
account system originally to buy songs at 99 cents a pop, and over the
years that same ID has evolved into a single point of entry that
controls my phones, tablets, computers and data-driven life. With this
AppleID, someone can make thousands of dollars of purchases in an
instant, or do damage at a cost that you can’t put a price on."
Additional
reporting by Roberto Baldwin and Christina Bonnington. Portions of this
story originally appeared on Mat Honan’s Tumblr.
- As seen in The Week
Brought to you by NetLingo: Improve Your Internet IQ
Subscribe to the NetLingo Blog via Email or RSS here!
Virtual Princeton: A Guide to Free Online Ivy League Classes
Elite universities are opening their classrooms' doors to anyone with
an Internet connection — for free! The company Coursera has teamed up
with 16 universities (including Stanford, Duke, and Princeton) to offer
more than 100 free online courses to anyone with Internet access.
Why are colleges offering free classes?
They
don't want to be left behind in the digital revolution that has already
transformed the way we consume news, music, and books. Stanford, Duke,
Princeton, and Johns Hopkins are among the 16 universities that have
partnered with a newly launched company called Coursera to offer more
than 100 free online courses this academic year; MIT, Harvard, and the
University of California, Berkeley, are following suit through a
nonprofit venture called edX. Now people anywhere in the world can take
Stanford's "Introduction to Mathematical Thinking," learn the
"Principles of Obesity Economics" at Johns Hopkins, or have Duke
University behavioral economist Dan Ariely lead them through "A
Beginner's Guide to Irrational Behavior"—all without paying the $50,000
usually required to attend these world-class universities. More than 1
million people from scores of countries have already enrolled in the
free classes, which some believe could transform the mission and model
of higher education. Anant Agarwal, president of edX, calls it "the
single biggest change in education since the printing press."
What's in it for colleges?
Prestige
now, and possibly profit later. Schools say they're willing to give
their product away for free so they don't miss the chance to be among
the first to develop new forms of education. "The potential upside for
this experiment is so big that it's hard for me to imagine any large
research university that wouldn't want to be involved," said Richard
DeMillo, director of the Center for 21st Century Universities at Georgia
Tech. One day the schools will likely try to make some money, too,
possibly by charging students for credits or allowing companies to
sponsor courses. But universities recognize that they could be
jeopardizing their hard-won reputations and their time-tested business
model, said Jason Wingard, a vice dean of the University of
Pennsylvania's Wharton School. "You run the risk of potentially diluting
your brand."
How do the classes work?
Much
like a typical college lecture course, but with an audience in the tens
or even hundreds of thousands. At a time of their choosing, students
watch videos of lectures by respected professors, and complete
interactive quizzes and regular homework to prove they grasp the
material. The Web videos incorporate graphics and virtual games, and
students can pose questions and debate one another in online discussion
groups. Professors say it's thrilling to reach so many students at once,
from teenagers in India to baby boomers in Indiana. Coursera co-founder
Andrew Ng, a Stanford computer
science professor, recently taught an online class to more than 100,000
students. To reach that many people, Ng said, "I would have had to
teach my normal Stanford class for 250 years."
Are the classes effective?
Some
educators doubt that virtual classes can match the experience of
face-to-face learning. Online education "tends to be a monologue and not
a real dialogue," said University of Virginia English professor Mark
Edmundson. There's also an extremely high attrition rate: Of the 160,000
people who enrolled in a Stanford artificial intelligence course last
year, only 23,000 finished the work. But the feedback that could improve
these courses is just beginning to roll in, and there's already some
evidence that students who stick with online courses learn just as much
as those in conventional classes. "This is the Wild West," said Agarwal.
"There's a lot of things we have to figure out."
Will this trend make college cheaper?
There
are grounds for hope. Since 1985, U.S. college tuition rates and fees
have grown by 559 percent. In theory, online courses could cut costs by
enabling universities to outsource coursework to the Internet and do
away with or share some academic departments. Fewer students would need
campus housing and other services. Universities have so far opposed
giving credit for free classes, instead conferring certificates that
don't count toward a degree. But that's already starting to change, with
the University of Washington offering credit for Coursera classes this
fall.
Could the web replace universities?
Not
anytime soon. "Why do people pay $50,000 a year to attend an
institution like Caltech?" Ng said. "The real value is the interactions
with professors and other equally bright students." Still, even a remote
dose of elite education can have great value to students who have no
chance of setting foot on an Ivy League campus. And lessons drawn from
the courses could reshape how colleges approach teaching, turning the
ability to offer a mix of online and face-to-face learning into the new
gold standard for top-notch educators. Sebastian Thrun, a Stanford
research professor who offers free online computer science classes,
predicts that there will be only 10 higher-education institutions in the
world in 50 years. "It's pretty obvious that degrees will go away," he
said. "The idea of a degree is that you spend a fixed time right after
high school to educate yourself for the rest of your career. But careers
change so much over a lifetime now that this model isn't valid
anymore." In the future, he says, people will return to college
throughout their lives, updating what they know through online courses.
A fresh start for the jobless
Free
online courses might have millions of immediate beneficiaries among
unemployed workers who need job retraining. Even with a law degree from
the University of Chicago, Dennis Cahillane, 29, couldn't get hired. But
after taking several free Stanford courses in building databases, he
recently landed a job as a programmer for a media website. And now he is
planning to work his way through Coursera classes in his spare time
until he's earned "the equivalent of a B.A. in computer science from
Stanford," he told Fast Company. Andy Rice, who owns a weather
forecasting company in Minnesota, says he's heartened when he sees
resumes from job applicants listing free courses. "I definitely want to
hire people who are always questing for new knowledge," he said. "Life's
not about what you learn when you're 22."
- As seen in The Week
Brought to you by NetLingo: Improve Your Internet IQ
Subscribe to the NetLingo Blog via Email or RSS here!
How Teens’ Texts Lead to Unsafe Sex
Teenagers who engage in sexting—sending
sexually explicit texts—are far more likely to begin having intercourse
at an early age and engage in other risky behavior, a new study has
found.
The study of 1,800 Los Angeles high school students shows that one in
seven has sent a “sext” message, and that those who have are seven
times more likely to be sexually active. Teens who sext—especially
girls— are also more likely to have unprotected sex, sleep with multiple
partners, and use drugs or alcohol before having intercourse.
“What we really wanted to know is, is there a link between sexting
and taking risks with your body? And the answer is a pretty resounding
‘yes,’” study author Eric Rice, a researcher at the University of
Southern California, tells Reuters.com. The fact that some teen
girls have suffered humiliation when ex-boyfriends widely distributed
photos of them naked doesn’t seem to be registering.
“There is an emerging sense of normalcy around sexting behavior,”
Rice says. Some 54 percent of teens say they have a friend who sexts,
which makes them 17 times more likely to try it themselves. “If their
friends do it,” Rice says, “they’re going to do it.”
- As seen in The Week
Brought to you by NetLingo: Improve Your Internet IQ
Subscribe to the NetLingo Blog via Email or RSS here!
The Digital 100: The World's Most Valuable Private Tech Companies in 2012
Business Insider
evaluated private tech companies and ranked the top 100 by value. Their
rankings are based on several metrics, including revenue, users, market
opportunities, growth rates, and the perception of investors and tech
gurus.
Here they are, The Digital 100, enjoy!
1. Alibaba
2. Bloomberg
3. Twitter
4. 360Buy
5. Palantir
6. Dropbox
7. Square
8. MLB.com
9. Softlayer
10. Vente-Privee
11. VANCL
12. Airbnb
13. Pinterest
14. Datapipe
15. Spotify
16. Craigslist
17. Flipkart
18. Ozon Group
19. Coupang
20. Wonga
21. Hulu
22. Klarna
23. Kaspersky Lab
24. Rovio
25. Conduit
26. Aricent Group
27. Survey Monkey
28. Mu Sigma
29. ZocDoc
30. Just Eat
31. Gilt Groupe
32. Everyday Health
33. Evernote
34. LivingSocial
35. Criteo
36. Zulily
37. Zoosk
38. Redfin
39. Qualtrics
40. Seamless
41. Media Ocean
42. JustDial
43. 10gen
44. AppNexus
45. GitHub
46. Tumblr
47. Box.net
48. Glam Media
49. Stella & Dot
50. Marketo
51. Etsy
52. One Kings Lane
53. Nasty Gal
54. Klout
55. Automattic
56. Xiu
57. Manta
58. Eventbrite
59. Sugar, Inc
60. Kickstarter
61. Apptio
62. Fresh Direct
63. eHarmony
64. Veracode
65. Wix
66. Turn
67. Quantcast
68. Nest
69. Fab
70. Foursquare
71. Storm8
72. Flipboard
73. Vibrant Media
74. Rubicon Project
75. OpenX
76. Return Path
77. Quora
78. Snapdeal
79. Tremor Video
80. RightScale
81. Whaleshark/RetailMeNot
82. Break Media
83. Tagged
84. Yext
85. Stripe
86. Rocket Fuel
87. Mind Candy
88. AddThis
89. SoundCloud
90. Xirrus
91. Federated Media
92. Say Media
93. Yodle
94. Coupons.com
95. Path
96. Shazam
97. Plenty of Fish
98. Warby Parker
99. Thrillist
100. Vox Media
- As seen in Business Insider
Brought to you by NetLingo: Improve Your Internet IQ
Subscribe to the NetLingo Blog via Email or RSS here!