June 19th, 2006
Disruptive Technologies and Business Models: Power Laws and Power Shifts: The End-User Revolution
Download the MP3.
Entry Filed under: audio,Berkman Center,Conference,Digital Identity,Privacy,Security
Name Required
Email Required, hidden
Url
Comment
Some HTML allowed:<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
Trackback this post | Subscribe to the comments via RSS Feed
Unless otherwise noted this site and its contents are licensed under a Creative Commons Attribution 3.0 Unported license.
Leave a Comment
Some HTML allowed:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
Trackback this post | Subscribe to the comments via RSS Feed