How it is being used, the technologies behind them? The advantages and disadvantages.
We divided into 2 groups and started talking about a product/service where we could promote but at the same time protect the users identity.
I am using this blog as a Learning Log.