IDG News Service - Yahoo is considering investing in hackers with good ideas and technologies, a company executive said on Saturday.
"We are open to many ways of having a stake in creative young companies," said Jeff Kinder, Yahoo’s senior vice president for media products and solutions, on the sidelines of a Yahoo Open Hack Day in Bangalore.
The Internet company does not have a fund earmarked for this purpose, or a definite model or set of criteria for such investments, Kinder added.
Hackers and Open Hack Days have proven to be important sources of new ideas and technologies for Yahoo, Kinder said. Meme, now a microblogging site, was transformed from an internal Yahoo product idea into a product on Yahoo’s platform after an Open Hack Day in Brazil in late 2008.
When the APIs (application programming interfaces) for Meme on YQL (Yahoo Query Language) were opened up for hackers at the Open Hack Day in Brazil, the developers built tools to help derive more value out of Meme. "In short, the developer community really helped us build this product to what it is today, thanks to Open Hack Day," a Yahoo spokesman said.
Meme has been rolled out in a number of countries including Brazil, the Philippines, Indonesia, Mexico, Taiwan, and India.
Koprol, a mobile location-based social networking site in Indonesia, that was acquired by Yahoo in May, was also set up by hackers who had their technology showcased at the Yahoo Hack Day in Indonesia last year, Kinder said.
Starting as an internal event for Yahoo developers, Hack Days were later extended to developers in a number of locations including London, Brazil, Taiwan, and Bangalore.
For the event in Bangalore, which was the third in the city, there were 1,800 registrants, of which about 500 were selected to participate. There were also 123 hacks at the event, making it the largest Open Hack Day so far hosted by Yahoo, the Yahoo spokesman said.
Open Hack Days also help Yahoo get feedback on its new APIs (application programming interfaces) and technologies, such as YAP (Yahoo Application Platform) and YQL, Kinder said. “Open Hack Days bring up a lot of ideas which contribute to our thinking within the company,” he added.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts