Natalie Portman reveals her ‘dark moments’ in college during powerful Harvard commencement speech

Fresh off the success of 1999’s “Star Wars: Episode 1,” actress Natalie Portman enrolled in Harvard University.

In 2003, she graduated with a degree in psychology.

But Portman’s time at school wasn’t always easy.

While addressing Harvard’s graduating class on Wednesday, she began by revealing, “I have to admit that today, even 12 years after graduation, I’m still insecure about my own worthiness.”

Natalie Portman Harvard speechReuters/Dominick Reuter

“Today I feel much like I did when I came to Harvard Yard as a freshman in 1999,” the now 33-year-old explained. “I felt like there had been some mistake, that I wasn’t smart enough to be in this company, and that every time I opened my mouth I would have to prove that I wasn’t just a dumb actress.”

Natalie Portman HarvardYouTube/Harvard

She continued:

When I got to Harvard, just after the release of ‘Star Wars: Episode 1,’ I feared people would assume I had gotten in just for being famous and not worthy of the intellectual rigor here. And they would not have been far from the truth. When I came here, I had never written a 10-page paper before. I was alarmed and intimidated by the calm eyes of fellow students who thought that the workload here was easy compared to high school. I was completely overwhelmed, and thought that reading 1,000 pages a week was unimaginable or that writing a 50-page thesis was something that I could never do.

Portman explains that she arrived at Harvard with the intention of proving she could be serious.

“I had been acting since I was 11 but I thought that acting was too frivolous and certainly not meaningful. I came from a family of academics and was very concerned with being taken seriously,” she told the crowd.

Natalie PortmanReuters/Dominick Reuter

Looking back, “it’s easy now to romanticize my time here,” Portman admits, “but I had some very difficult times here too.”

“Some combination of being 19, dealing with my first heartbreak, taking birth control pills that have since been taken off the market for their depressive side affects, and spending too much time missing daylight during winter months led me to some pretty dark moments particularly during sophomore year,” she explained. “There were several occasions I started crying during meetings with professors, overwhelmed with what I was supposed to pull off when I could barely get myself out of bed in the morning.”

Natalie Portman REUTERS/Dominick Reuter

Portman says that after taking intense courses and being “seriousness for seriousness’ sake,” she finally allowed herself to realize that her true passion all along was acting.

“When I got to my graduation, after four years of trying to get excited about something else, I admitted to myself that I couldn’t wait to go back and make more films,” Portman told the students. “I wanted to tell stories, imagine the lives of others, and help others to do the same. My Harvard degree represents to me the curiosity and invention that we’re encouraged here, the friendships I’ve maintained.”

Portman also drove home another point — using naïveté and youth to one’s benefit.

Natalie Portman harvard speechYouTube/Harvard

“Make use of the fact that you don’t doubt yourself too much right now,” she urged graduates. “As we get older, we get more realistic and that includes about our own abilities or lack thereof. That realism does us no favors.”

“Fear protects us in many ways, but what has served me is diving into my own obliviousness,” Portman explained. “Being more confident than I should be … trying things that you never would have tried. Your inexperience is an asset in that it will make you think in original, unconventional ways. Accept your lack of knowledge and use it as your asset.”

Portman says this was especially poignant for her when making “Black Swan,” for which she later won the Oscar for best actress in 2010.

natalie portman black swanYouTube screencap

When first approached about the role, she lied and told the director she was “basically a professional” ballerina. She didn’t realize until she had already gotten the job that she was “about 15 years from” being an actual professional.

“The point is, if I had known my own limitations, I never would have taken the risk, and the risk led to one of my greatest personal and professional achievements,” said Portman.

Natalie Portman OscarsAP Images

But above all, says the married mother of a little boy, “The most fulfilling things I’ve experienced have truly been the human interactions.”

“It’s a cliché because it’s true — helping others ends up helping you more than anyone,” she says. “Getting out of your own concerns and caring about someone else’s life for a while reminds you that you are not the center of the universe.”

Check out Portman’s full speech below. It’s worth a watch:

JerryScript & IoT.js: JavaScript for IoT from Samsung

Samsung has recently open sourced IoT.js, a platform for IoT applications written in JavaScript, and JerryScript, a JavaScript engine for small, embedded devices.

The purpose of the two projects from Samsung is to enable JavaScript developers to build applications for the Internet of Things. IoT devices come with severe constraints in terms of CPU performance and memory footprint. Because of that, Samsung has designed the JerryScript engine to run in less than 64KB or RAM and the entire code fits in less than 200KB of ROM. Running some JavaScript code on JerryScript looks like this:

  jerry_init (JERRY_FLAG_ENABLE_LOG);

  char script [] = "print ('Hello, World!');";
  jerry_parse (script, strlen (script));

  jerry_run ();

  jerry_cleanup ();

The IoT.js platform uses JerryScript to run JavaScript code and libuv for asynchronous I/O, and enables developers to create IoT services that communicate with each other and the outside world. IoT.js currently runs on Linux and NuttX – a real-time OS – and targets Raspberry Pi 2 and a ST board, with plans for other MCUs and IoT devices. The API provides functionality for buffers, console, events, GPIO, streams, timers, among others.

The following graphics show the internal architecture of a JavaScript application running on IoT.js/JerryScript and a comparison between running the same app on IoT.js vs. Node.js:



We reached out to Samsung to find out more about these projects.

InfoQ: A JavaScript engine running on just 64KB of RAM seems to be very constrained. How did you achieve that?

Samsung: There are many quality attributes to consider for a JavaScript engine. Today, the most important one is performance, because we want web applications running in the browser to look like native applications.

From the perspective of IoT, we only focused on memory footprint.

JerryScript is a pure interpreter in contrast with multi-stage adaptive JIT engines today. So it has no overhead for storing compiled code. Even the parser doesn’t store AST. It produces bytecode line-by-line directly from the source code. For data representation, objects in JerryScript are optimized for size. JerryScript is using compressed pointers, bytecode blocks with fixed size, a pre-allocated object pool and multiple representation of Number objects to achieve both standard compliance and memory optimization. We will keep continue to reduce the memory footprint in various ways. You can check out the details of JerryScript internals at

InfoQ: What are the benefits of using JavaScript for IoT?

Samsung: JavaScript is the most famous programming language in the world today [1][2][3]. There is a large number of web developers familiar with it. So, using JavaScript for IoT easily enlarges the developer community for IoT. Java for Android is a good historical example.

On the other hand, JavaScript is well-suited for embedded device programming. It supports asynchronous function calls and I/O which are useful for event-driven hardware programming.

Finally, JavaScript is the most widely used language for the Web. Making IoT devices interact with the web ecosystem is a wise choice for building an IoT ecosystem. Accordingly, many web standards such as HTTP, JSON, REST are already at the center of IoT connectivity standardization. The only one missing is JavaScript. We think that JavaScript is the most important one for the application and service interoperability layer on top of connectivity.

InfoQ: What functionality is IoT.js providing?

Samsung: The core of IoT.js is backward compatible with Node.js. To do that, IoT.js obeys the CommonJS specification for modular programming and supports a core subset of Node.js’ API. For IoT purpose, we are defining standard modules specific to embedded device control and IoT programming. As of now, we defined the first candidate specification for GPIO access API and implemented a prototype of it. We think that these activities should be done in consensus with the IoT community, in order to be of real value. That’s why we open sourced IoT.js. Please refer to this issue discussions on GitHub (

We will also provide the interfacing to IoT connectivity layers such as OIC/IoTivity, AllSeen Alliance, etc. It will be one of *.npm like modules.

JavaScript Beyond the Web

In the span of only a few years, JavaScript has fast become the most valuable language I’ve ever worked with. I know I’m not alone on this one. I remember the early days on Netscape Navigator when I was overjoyed to see I could change the text on my webpage by asking the user a question in a prompt dialog box. Like all great technology moments, it truly did feel like magic.

Since then, JavaScript has grown and matured to so much more than I could have ever imagined in the early scripting days. We can now code powerful web applications, mobile apps, Windows 8 apps and even entire servers with JavaScript.

The true versatility of this language has hit what I believe is its most exciting moment yet -­ it now can be used to control and monitor your mobile phone, the lights in your house, robotics, augmented reality with Google Glass, your hand and finger movements with Leap Motion and so much more.

In this article, I’d like to give a high level overview of some of the technology enabling the “Internet of Things” that JavaScript developers can start working with today.

If you’re a JavaScript developer and want to get tinkering in the world of Internet connected things using your existing skill set, there are more options than most developers realise. There is so much opportunity for innovation and an equally enticing opportunity for some entertaining tech driven pranks …

Ninja Blocks

Photo credit: Ninja Blocks Inc

What are they?

Ninja Blocks are small computer devices that let you invoke and respond to devices in the real world all from the cloud. It works by communicating to devices over either the 433Mhz band (a common set of frequencies for remote controlled devices) or via USB connection. It has a JavaScript API allowing you to connect it up to your own Node server and tap into the Ninja Blocks platform.

What could you do with it?

New combinations of the technology are being tinkered with every day, a few examples of what is possible include:

  • Turn on your lights via a tweet on Twitter
  • Fire a Nerf gun remotely and take a photo of what ensues on a connected webcam
  • Turn on your air conditioning any time you get home and the temperature is above a certain threshold
  • Switch the colour of your lights to certain colours if your phone receives texts from certain people


What is it?

Arduino boards are single­board microcontrollers that control electronics using an open­source platform. Luckily for JavaScript developers, there are several JavaScript APIs that have been developed to interface with the Arduino platform. The main ones I’ve come across are:

  • Johnny Five, an open source JS Arduino framework
  • node­-arduino, a Node package for working with Arduinos
  • Noduino, another Node and JS framework for toggling basic Arduinos controls

What could you do with it?

A few examples of Arduino projects I’ve seen are:

Raspberry Pi

What is it?

The Raspberry Pi is a small computer that you can plug into your television to do everything from play HD video to editing spreadsheets. It is a fully functional computer at a low price that is open for tinkering! For all of you JavaScript lovers out there, allows you to write embedded applications for the Pi in JavaScript using their cloud platform for communication. It is also possible to install Node on a Raspberry Pi, using it as a server to relay any information you’d like from devices you connect to your Pi.

What could you do with it?

  • A home automation system running on Node, MongoDB, HTML5 and web sockets
  • One group made a miniature version of the house from the Pixar movie “Up” that flew over Paris and posted photos on Instagram using a Pi
  • You could even get a “Pi Crust” which allows you to turn your Raspberry Pi into a Ninja Block


Photo credit: Technical Machine

What is it?

Tessel is a wifi enabled microcontroller allowing you to add it to a hardware device so it can communicate with the web and join the Internet of Things. It aims to help make the transition to hardware as simple as possible for software developers by using the same workflow and skillset that JavaScript developers already have. It doesn’t just have a JavaScript API as an option, JavaScript is its central focus making it all the more exciting for us JavaScript developers. Sadly, it isn’t available just yet but you can pre­order now for the 2014 release.

What could you do with it?

  • Develop your own gadget that can be remotely controlled via the web
  • Bring new functionality to an existing hardware device by adding in Tessel modules like an accelerometer, RFID, GPS and more


Photo credit Pur3 Ltd

What is it?

Espruino a JavaScript interpreter for microcontrollers. Espruino boards are like the Tessel, however the Espruino board is a much cheaper board with only 8KB of RAM and doesn’t have preset modules such as the accelerometer available to plug and play (you’d need to find and attach some of that yourself).

What could you do with it?

  • Similar usage to Tessel, interact with motors, lights and so forth, however the Espruino board may be better for more battery efficient smaller projects


What is it?

on{X} is an Android application that allows you to control your device and respond to events like incoming text messages, GPS location, battery life and more via a JavaScript API. You can add and remove rules you’ve made remotely and they’ll install to your device over the web. It’s one of my favourite Android apps to date. Truly a coder’s paradise.

What could you do with it?

  • Launch foursquare when you stay in one location for longer than 20 minutes
  • Text your partner when your phone is about to run out of battery
  • Have your phone suggest for you to bring an umbrella if the weather forecast thinks it’ll be rainy that day

Are there different kinds of birth control pills?

es. There are many different kinds of birth control pills (there are different doses of hormones in different hormonal pills). You will be asked questions about your medical history and also about your health insurance and if you have a co-pay (cost your health insurance doesn’t cover) for different pills. Your health care provider may prescribe a progestin-only pill (if there’s a medical reason why you shouldn’t take estrogen). If you don’t have any medical problems that would put you at risk for medical complications, your health care provider will decide which birth control pill is the best one for your first prescription.

How to setup Seedbox in 10 Min in OVH

1st thing you need to get your server:

2d you get your login information

YOU choose Ubuntu server 12.04

Archetecture 64 bit, Software RAID, Use distribution native kernel.

Next delete all current partition

Now we are going to make a pertition for our OS

And then click on add the partition.

Next we are going to make another partition for swap, Jut look into the blow screenshot and fill accordingly

Click on add partition,

Next we create the primary partition

Now after this the screen should look like this

Go ahead and name your seedbox to whatever you like:

It can also help you reinstalling it as an template.

You then login with SSH using putty

Click open and log in and use the below code to update your system and click enter that would take a few minuites.

Next we get the apps upgraded in our system

Use the code apt-get upgrade to do it

After that we are almost ready to install our script but before that we need to put a username and password there

So ty

So type adduser seedbox

And then it will prompt for a password which you can choose yours accordingly.

When prompted with this screen just hit the enter , as the default settings are just fine , then it will prompt for the “Is the information correct”

Hit y

Then type adduser seedbox sudo

This will give all the privileges to the user.

Now again run putty and log in with the new username and password and it should look something like this:


Now you can see it shows because of system update reboot is required so you reboot it using the reboot command as shown in the below screenshot

Sudo reboot

Once you give the above command it will ask for the password we had set, type the password and hit enter

And it should look something like this

Let it reboot it might take sometime

Then again login with putty to your server and use the username and password for seedbox to log in

Then we need to install Irssi

Code – sudo get-apt install irssi

What is a seedbox?

Nowadays people are concerned about their privacy online whilst downloading torrents. And so they should be, with huge corporations monitoring torrent traffic and fining users. You may have heard the term ‘seedbox’ and been left wondering ‘what is a seedbox?’.

So, what is a Seedbox?

A seedbox is a remote server at a high speed data center with a public IP address that is used to safely downloading and uploading files using torrents at very high speeds. These speeds range from 100Mbps (8MB/s) to 10Gbps (1250MB/s) . People with access to a Seedbox can download these files to their personal computers anonymously.

Simply put, you get a share of a computer that has a super fast internet connection. The sole function of this computer is to download and upload torrents. There are numerous benefits to downloading torrents using a seedbox. This article will explain why you need a seedbox.

How to use a Seedbox

Each Seedbox has one of more torrent clients with web user interface that you can log into via any browser where you can control your Seedbox remotely. In the interface you can load torrent files or torrent URLs and once loaded they will start downloading immediately and will seed the torrent afterwards, once again, remotely with no tracks to the local desktop IP of the Seedbox user. Once the torrent has downloaded on the Seedbox, it’s hosted there waiting for you to download it whenever you wish.

Downloading is commonly done via an FTP or SFTP connection to the Seedbox using an FTP Client (We recommend FileZilla), some Seedbox vendors also provide an HTTP file browser that allows you to download files from the Seedbox via a web browser. Either way, this prevents any torrent traffic from coming from your home internet connection but instead you only initiate legitimate FTP/HTTP traffic that your ISP (Internet Service Provider) should permit.

What you get from a Seedbox

Now that we’ve answered the question “What is a Seedbox?” we can proceed and explain why it’s really awesome!

High speed downloads

Seedboxes allow you to download at unprecedented speeds. Seedboxes are inside datacenters that have incredibly fast connections to the internet. You can get seedboxes with connections that range from 10Mbps to 1Gbps. The connection of a 1Gbps seedbox is so incredibly fast that the hard disk is actually the limiting factor on the download speed because of the write speed of the disk. Some providers now offer SSD seedboxes in order to enable even faster speeds.

Wondering 'What is a seedbox?' This is a screenshot of a Seedbox downloading at 100MB/s

What is a seedbox? This is a seedbox.

Above is a screenshot of a seedbox downloading a file at 160MB/s! To put this into perspective, you could download a full HD film in about 2 minutes. You could download an entire OS in 40 seconds. You could download an entire TV series in HD in one minute.

So, are you are tired of waiting for large files to download? Or is your internet connection not up to scratch? Then you are in need of a seedbox. One thing to note with this is that you will still need to download the file from your seedbox over you standard home connection. This should download at the maximum speed your home internet is able to.

Privacy / Safety

Seedboxes are remotely hosted so you don’t need to worry about getting scary letters from lawyers telling you to stop downloading torrents. This is because you aren’t actually using the BitTorrent protocol that is monitored from your home IP address. This makes it much more difficult for you to be tracked and targetted. A lot of seedbox providers offer VPN services in addition that further anonymise your internet usage. Furthermore, if you sign up to a service that accepts bitcoins or pay with a prepaid credit card whilst using a VPN, there is no personally identifying information linking you to your seedbox provider. More on using seedboxes anonymously will come to this site soon.

So if you want to download torrents anonymously and without the risk of getting extortionate fines from copyright agencies then you need a seedbox.


It’s important to note that most seedbox providers don’t allow the use of public trackers such as The Pirate Bay. This is sensible because the agencies that track and fine torrent users mainly monitor public trackers. Once you manage to get in to a private tracker, the main issue you will likely have is maintaining your ratio (uploading as much as you download). With a seedbox maintaining your ratio is simple. A seedbox comes with a large hard drive is constantly on, so you can download a file using a private tracker and then leave the file on the seedbox uploading. This takes no effort on your part and maintains your ratio on the site. No need to worry about your upload traffic at home either because it’s all done remotely.

So, if you’re worried about maintaining your ratio of private torrent trackers then a seedbox is the right choice.

Circumvent ISPs

ISPs can be rather sneaky when it comes to you using their service. If an ISP thinks you are using too much of their bandwidth, they will ‘shape‘ your torrent traffic effectively limiting you to a slower speed. A seedbox avoids this by not using torrent traffic on your home ISP. Additionaly, your BitTorrent ports might be blocked by your ISP which is also avoidable by using a seedbox.

To download files from your seedbox you use FTP. If you use SFTP or FTPS (TLS) then your connection between you and the Seedbox is encrypted and your ISP can’t see what you are downloading, only how much you are downloading. An alternative to this is to use a VPN which many seedbox providers offer as part of their service.

If your ISP shapes your traffic or you are worried about your ISP snooping on your traffic then we would reccommend that you use a seedbox.


Seedboxes are convenient to use, you don’t need a computer that’s always on eating up your data allowance. You don’t need to worry about upsetting roommates by downloading large files and slowing down the internet for everyone. You can even set up your seedbox to read a trackers RSS feed and automatically download specific files as soon as they are released. We’ll write more about torrent and seedbox automation soon.

If you want your torrenting life to be made easier and simplified then you need to get a seedbox.

How do I get a seedbox?

Now that you know what a seedbox is and why you need a Seedbox, you probably wonder how to get a Seedbox and which one?

Seedbox Guide provides a powerful list of seedbox providers that you can search, filter and sort. We list hundreds of Seedbox plans and allow customers to add reviews about specific plans. Seedbox Guide also uniquely scores Seedbox plans based on their specifications like storage, speed, price, traffic allowed, customer support and more. Based on our experience in the niche you can make an informed decision.

How to Express Your Opinion through Writing

The digital age confers upon all internet-connected individuals the means to express their opinion to billions, to the entire connected world. The problem becomes that there are so many reactive opinions that flood into cyberspace that few opinions attain much resonance with the masses.


So, say you have read something or encountered an absurdity in daily life which triggers the desperate need for you to convince others to see different aspects of the issue, to view the issue in your way. Maybe it is an issue about which you care deeply, and one about which you have an insight which you feel could really make a positive change in the world. To learn how to express yourself with powerful impact and make your voice heard, you must develop your case logically, write persuasively, and punctuate everything with visual impact. Only then will you have a chance to change minds and change the world.

How To Romantic Mug Set

Wake up your Valentine with a romantic mug set — one for your sweetheart and one for you. The process for personalizing a ceramic mug with permanent marker is very simple, and your significant other will be reminded of your romantic sentiments long after February 14th has passed. Getting your morning caffeine fix has never been sweeter.

Begin by writing your saying onto your cups in pencil first. Take your time and get the lettering exactly how you want the final product to look. You can use a straight edge to keep everything aligned correctly. Add any illustrations you would like.

All you need are two blank mugs, a pencil, an oil based permanent marker and an oven.

Next, carefully trace over the pencil marks with an oil-based permanent marker. It must be oil based or your project will not work. Allow to dry for 2 hours.

Largest Brands And Agencies Take TAG Pledge To Fight Ad-Supported Piracy For All Digital Ads

Anti-Piracy Leaders Include Allstate, American Express, Colgate-Palmolive, Comcast, GroupM, Intel, Johnson & Johnson, Kellogg’s, MillerCoors, SMG, State Farm, Vivaki, Unilever, Walmart, ZenithOptimedia

TAG Announces First Group of Validated Anti-Piracy Service Providers: comScore, DoubleVerify, Incopro, Integral Ad Science, sovrn, Veri-Site, whiteBULLET

 The Trustworthy Accountability Group (TAG), an advertising industry initiative to fight criminal activity in the digital advertising supply chain, today announced that many of the world’s largest brand advertisers and agencies have pledged to require their ad partners to take aggressive steps to help fight the $2.4 billion lost to pirate sites each year.

Advertisers signing the TAG anti-piracy pledge include Allstate, American Express, Boehringer Ingelheim, Colgate-Palmolive, Comcast, Dole Packaged Foods, Dr. Pepper Snapple Group, Intel, Johnson & Johnson, Kellogg’s, MillerCoors, NBCUniversal, State Farm, Unilever, Viacom, Walmart, The Walt Disney Company, Warner Bros., Yamaha, and 21st Century Fox. Agencies signing the pledge include GroupM, Horizon Media, Maxus Global, MediaCom, MediaVest, Mindshare, MEC, Neo@Ogilvy, Starcom Mediavest Group, VivaKi, Xaxis, and ZenithOptimedia Group.

TAG also announced that the first group of TAG-validated providers of anti-piracy services, including comScore, DoubleVerify, Incopro, Integral Ad Science, sovrn, Veri-Site, and whiteBULLET, are completing the validation process. Those companies, which undergo an independent third-party audit process, will provide anti-piracy services to help cut off the flow of advertising revenue to sites that profit from pirated content and counterfeit goods. In addition, digital ad leaders OpenX, Rocket Fuel, PubMatic, and SpotX were certified in their anti-piracy efforts through a TAG-designed self-attestation process.

“Today marks a turning point in the fight against ad-supported digital piracy,” said TAG CEO Mike Zaneis. “Many of the world’s largest brand advertisers and agencies have now committed to take aggressive steps to keep their digital ads off infringing sites, and we have announced the first group of anti-piracy companies that are being validated to provide those services. There is tremendous momentum behind this initiative from advertisers and agencies that no longer want to put their valuable brands at risk of association with this criminal activity, and we are delighted at the commitments and support for these efforts.”

The TAG anti-piracy program helps prevent ad placement on websites that facilitate distribution of pirated content and/or the illegal dissemination of counterfeit goods. Through the program, providers of anti-piracy tools and services must be validated as Digital Advertising Assurance Providers (DAAPs) by independent third-parties including Stroz Friedberg, Ernst & Young, and the Alliance for Audited Media, in coordination with TAG.

To be validated, DAAP candidates must show how they identify risky sites, prevent ad placement, disrupt site transactions, monitor and assess the safety of ad placements, and/or prevent payment to sites that are deemed likely to offer pirated content or counterfeit goods. Companies using a DAAP’s anti-piracy services can receive a TAG “Certified Against Piracy” seal to demonstrate their compliance with TAG’s anti-piracy standards.

“Visitors to pirate sites often fall victim to malware and viruses that are used to drive bot nets creating false and fraudulent traffic,” said Jennifer Gardner, Director of Media and Partnerships, Unilever North America. “In addition to impacting people and their devices, this also drives up costs for digital advertisers. Unilever believes that industry-wide efforts like TAG’s anti-piracy campaign can help improve the consumer experience as well as bring rigor and accountability to digital advertising.”

By signing the TAG anti-piracy pledge, companies commit to take “commercially reasonable steps to minimize the inadvertent placement of digital advertising on websites or other media properties” that support piracy or counterfeit content by January 1, 2016. Companies agree to fulfill that pledge in a manner consistent with TAG’s anti-piracy efforts which may include, among other things, directly hiring a DAAP, using ad placement services that have been certified by TAG, or by doing business exclusively with ad agencies that have been certified by TAG.

According to a study released last week by the Interactive Advertising Bureau (IAB) and EY, pirated content is costing the digital ad industry roughly $2.4 billion each year, with roughly two billion dollars of that total lost to consumers who do not pay for infringed content while an additional $456 million is lost in potential advertising revenue.

To use a TAG-validated provider of anti-piracy services, companies can contact the DAAPs named herein. More information and the full criteria developed for the TAG Brand Integrity Program Against Piracy – including a full list of companies that have taken the TAG Pledge – can be found at

About the Trustworthy Accountability Group

The Trustworthy Accountability Group was created to spur transformational improvement at scale across the digital advertising ecosystem, focusing on four core areas: eliminating fraudulent traffic, combating malware, fighting ad-supported Internet piracy to promote brand integrity, and promoting brand safety through greater transparency. For more information on TAG, please visit

TAG Brings Ad Leaders Together To Launch War On Digital Ad Fraud

New Two-Part “Verified by TAG” Initiative Includes TAG Registry (Available Today) to Identify Responsible Ad Providers and Payment ID (Coming Soon) to Prevent Payments to Fraudsters

Largest Ad Networks and Agencies Pledge Support, Including AppNexus, AOL, Dentsu Aegis Network, Index Exchange, Interpublic, Google, Omnicom, Publicis, Rubicon Project, WPP

The Trustworthy Accountability Group (TAG), an advertising industry initiative to fight criminal activity in the digital advertising supply chain, today announced an industry-wide anti-fraud program, Verified by TAG, to fight digital ad fraud and bring new transparency across the digital ad ecosystem. “Verified by TAG” has two core and interlocking elements: the TAG Registry of legitimate advertisers and publishers, which will be available for application today, and a Payment ID system coming soon that will connect all ad inventory to the entities receiving payments for the ads.

Legitimate companies across the supply chain can now apply to the TAG Registry to be verified by TAG as a trusted advertising party. Registered (or “TAG’ed”) companies will receive a TAG-issued identifier that they can share with partners and pass with every ad they buy, process, place or run.

On a parallel track, TAG is currently developing a Payment ID system in cooperation with leading companies in the programmatic space. The goal of the Payment ID system is to create a record of who gets paid for every impression to prevent criminals from receiving ad spend.

Programmatic leaders including AOL, AppNexus, Index Exchange, Google, and Rubicon Project have pledged their support for these dual initiatives, as have the five largest global advertising holding companies, Dentsu Aegis Network, Interpublic, Omnicom, Publicis, and WPP. All of those companies have agreed to encourage their digital partners to take part in both initiatives.

“The TAG Registry and upcoming Payment ID system will act like a ‘two-factor authentication’ for the digital ad supply chain,” said TAG CEO Mike Zaneis. “Through the TAG Registry, buyers will be able to ensure that they are working with trusted parties at every step of their campaigns, while the Payment ID system will ensure that payments only go to legitimate players, choking off the cash to criminals. These programs will serve as the cornerstone of TAG’s anti-fraud efforts by providing transparency across the digital ad ecosystem. Registration is now open, and it’s time for every company in digital advertising to get TAG’ed.”

Companies across the ad ecosystem are encouraged to apply to the TAG Registry. After a proprietary background check and review process, approved companies will receive a unique identifier that will allow them to identify their ads to trading partners in the supply chain. Those identifiers can also be matched with the upcoming Payment ID system to ensure that payments are going to the correct registered and legitimate companies. Registered companies will also be eligible to participate in TAG’s other seal programs to highlight the steps they have taken against fraud, piracy, and malware.

Companies can learn more about TAG’s Anti-Fraud efforts or apply at TAG registration.

About the Trustworthy Accountability Group

The Trustworthy Accountability Group was created to spur transformational improvement at scale across the digital advertising ecosystem, focusing on four core areas: eliminating fraudulent traffic, combating malware, fighting ad-supported Internet piracy to promote brand integrity, and promoting brand safety through greater transparency. For more information on TAG, please visit

Quotes from Participating Companies

Megan Pagliuca, CEO of Accuen, Omnicom’s programmatic agency:
“Fraud is a blight on our industry – the only way it will be eradicated is through a collective commitment to zero tolerance. The Tag Registry and Payment ID initiatives are significant steps toward achieving that outcome, and assuring transparency in the digital ad supply chain.”

David Jacobs, Senior Vice President, AOL Platforms:
“For some time, AOL has worked with the IAB and industry partners to combat fraud on two fronts: by deploying the best technologies available and by choking off the economic incentives these bad actors exploit. TAG’s registry and payment ID take those efforts even further, putting in place a system to verify digital operators and follow the money trail. The ultimate goal is to ensure greater transparency into the advertising that helps support the free, open Internet, and we are proud to be a charter participant.”

Brian O’Kelley, CEO, AppNexus:
“Advertising is the power source of a free and open Internet, and it’s incumbent upon industry leaders to keep the marketplace clean and transparent. This important initiative establishes another layer of accountability that will benefit all actors in the ecosystem, and we’re very pleased to be part of it.”

Lucas Cridland, US President, Amplifi, the media investment division of Dentsu Aegis Network:
“Eliminating fraud from the media ecosystem is at the top of our priority list because of the detrimental impact that it has on all involved parties. The launch of TAG and Payment ID is a huge step in the right direction for us and for our clients. We’re proud to take part in an initiative that aids in achieving the levels of transparency and accountability that should have been present from the beginning.”

Scott Spencer, Product Management Director, Google, and Chairman of the TAG Anti-Fraud Working Group:
“Ad fraud is a solvable problem. If the industry continues to work together on projects like this, we can prevent illegitimate sites and traffic providers from taking spend from the ecosystem and help legitimate publishers earn the revenue to support their businesses.”

Ari Bluman, Chief Digital Investment Officer, GroupM:
“Adoption of ‘Verified by Tag’ is a no-brainer to combat fraud and keep ad dollars out of crooks’ pockets. Our own anti-fraud efforts have been labor intensive; TAG is making anti-fraud initiatives more efficient and will ultimately make it much more difficult to build fraudulent businesses by exploiting the digital advertising ecosystem. Going forward, we will only consider inventory from TAG-verified sources and encourage others to do the same.”

Andrew Casale, CEO, Index Exchange:
“Accountability and sunlight are crucial elements of a fully transparent supply chain. Both the TAG registry and Payment ID are strong steps toward achieving them, and through them a mature, principled marketplace. We’re excited to be charter members of both initiatives.”

Gregory R. Raifman, President of Rubicon Project and founding Board Member of TAG:
“As a leader in inventory quality, we have long been committed to providing a clean, well-lit environment for the buying and selling of advertising and stand behind efforts to help elevate the industry and improve the overall advertising ecosystem. These important TAG initiatives represent the latest arrow in our quiver to help ensure advertisers get real value for their dollar whether they are buying on our platform or elsewhere and we look forward to industry-wide implementation.”

Stephan Beringer, CEO of VivaKi (part of the Publicis Groupe):
“Quality, viewability and transparency have been hallmarks of VivaKi since we opened for business in 2007. Through our VivaKi Verified process and Quality Index, we have created an industry leading practice that has vetted thousands of platforms and partners across the digital ecosystem. We applaud the TAG Registry initiative and all of the companies who are standing behind it, and we are eager to bring the rigor of our verification processes to bear on this critical initiative. The investment power represented by this confederation can only advance the principles and standards that have always been strategic pillars for Publicis Groupe.Fuck Ad TAG