Collaborate, hunt down leads, track email, and more.
Your ability to sell stuff is what will ultimately keep your business afloat. So it’s time to lace up your wingtips, pound the pavement, and seal some deals.
Collaborate, hunt down leads, track email, and more.
Your ability to sell stuff is what will ultimately keep your business afloat. So it’s time to lace up your wingtips, pound the pavement, and seal some deals.
David Remnick on his approach for “The New Yorker Radio Hour,” launching Saturday, and the importance of sitzfleisch.
You’ve heard of The New Yorker? It’s a great magazine.
“We make booze to pay for art and science,” says the cofounder of the New York-based vodka maker.
Industry City Distillery has been a beautiful accident from the start. And much of it still doesn’t make sense four years after the first batch was created—until you taste what’s in the bottle.
The story of Deeplocal’s Nathan Martin—both versions of him.
How does one go from a punk-rock, bring-down-the-establishment social anarchist to a CEO working with brands like Nike and Google? That’s the story of Nathan Martin, the founder of Deeplocal, a Pittsburgh-based creative agency that’s produced a host of culture-jamming branding events for major corporations.
Could the next $100 million business come from a marginalized neighborhood? Waze’s Di-Ann Eisnor and rapper Lupe Fiasco are sure of it.
It was in May 2014 that Di-Ann Eisnor met Lupe Fiasco. Eisnor is an executive at Google’s Waze, an angel investor, and a “neogeographer,” while Fiasco is a Grammy Award-winning rapper; the two were united as Henry Crown Fellows at the Aspen Institute. “We hit it off,” recalls Fiasco. Soon, they got to speaking about shared concerns: inequality in America, ghettoized neighborhoods, and the lack of diversity in the innovation economy.
You’re so predictable.
Analyzing big data sets in order to forecast trends or predict customer behavior usually relies on both computers and humans. Computer algorithms are advanced enough to rapidly comb through numbers and find useful patterns, and humans are still necessary for setting the parameters and analyzing the results. But an algorithm created by two MIT researchers suggest we could take out the human factor all together.
Interviews with nearly 30,000 parents and children from 12 countries informed the Lattjo collection of play-oriented design.
Play isn’t just about fun and games—it’s a valuable way for children to refine their motor skills, learn about the world around them, and develop social relationships. 50 years ago, that might have meant hide and seek; 30 years ago maybe it was Jenga; today it’s probably any number of games on a PlayStation or iPad. Anecdotally speaking, play changes with the decades, but what Ikea wanted to do with its 2015 Play Report is quantify the social forces that are driving the shifts and understand how design in the domestic realm—the company’s domain—can help adults and children play more.
Want superhero-like powers? You got them.
If you ever saw Arnold Schwarzenegger’s 1996 movie and loved the gun-scope that could see through walls, then MIT has good news for you. That scope is now real.
Portuguese designer Giestas has created a trilogy of books that visualize a year of his emotions as rainbows of feelings.
Even after years of therapy and mindfulness, many of us have difficulties mastering the full spectrum of our emotions. Portuguese designer Giestas decided to turn it into a data visualization problem, He recorded his emotions every hour for 300 days, then turned them into a trilogy of color-coded diaries, each page of which represents his emotional spectrum for a 24-hour period.
A new suite of tools by startup Dyadic can stop a cybersecurity breach in progress.
Almost all companies use cryptography—the creation of secure communication techniques like codes and encryption—to protect sensitive information online, including customer passwords and credit card data. However, many organizations that depend on cryptography don’t understand the specifics of how different forms work, which means they cannot respond effectively when their systems experience a breach by hackers or are compromised from the inside.