Posts tagged Google

The Future of Google Maps

  At the SMX Advanced Local session in Seattle on June 22nd, Google unveiled some more detail about their plans for promoted pins on Google Maps. …

In that example, the focus was on branded pins during a driving experience—imagine something like a paid-for golden arches pin from McDonald’s on your trip to Yellowstone this summer.

…In fact, the legal industry may have pioneered the concept of Google Map spam; back in 2008, Mike Blumenthal wrote an article called “Ambulance Chasing in the Age of Google Maps,” wherein he showed different law firms offices suddenly appearing at the location of a train accident.


15 Important Google URLs

This article on Loud Techie contains links and brief description of the purpose for each of these 15 URLs.   Continue reading »

Google’s “About me”

Google has a new tool that lets you know what they know about you and what they can tell others.  It is About meContinue reading »

Safenetting Stalker Alert : avoid fake content that will stalk you

BEWARE : Google Spoof email steals your identity

Google phishing identity theft

Tech & Science Expert Refutes Notion that Google Flu is a ‘Failure’

fluIn 2009, Google announced that they suspected they could “accurately estimate the current level of weekly influenza activity in each region of the United States, with a reporting lag of about one day.” By tracking search engine behavior, the company hoped it could predict flu outbreaks even faster than the CDC.

Continue reading »

Google’s new privacy change affects 85% of iPhone users

According to this article on Quartz, “What Google really wants is for everybody to be signed in to their Google accounts all the time.”   Continue reading »

IDG: 5 Ways to Make Your Enterprise Storage Easy to Scale

mobile malware, Data breaches, cyber-threats and fraud In this issue you’ll find out how to make your data storage easier to scale and how to avoid legacy storage vendors. Plus, get an overview of BlackBerry 10 security — 10 Steps to Mobile Recovery ; Protection for Every Enterprise ; Virtual Radiologic and 5 Ways to Make Storage Easy to Scale

Continue reading »

IDG: Fraud, Theft and Sheep in CyberSpace

mobile malware, Data breaches, cyber-threats and fraud Thursday 8 August 1963 saw one of the most famous thefts in British history – the Great Train Robbery. 50 years later, and while the medium might have changed, the principle is the same – on 21 November Sheep Marketplace reported the theft of 5,400 bitcoins – £3.3m at current exchange rates. This week we look at online theft and fraud; the Global Fraud report, our own investigation into the sinister side of crowdfunding, as well as a look at ‘The Great Bitcoin Robbery’.

Continue reading »

Wired on the iPad Intro

This opinion piece on Wired, is actually titled “How Steve Jobs Made the iPad Succeed When All Other Tables Failed” is by Fred Vogelstein.   Continue reading »

Mobile Malware: The Threats, The People, The Solution

mobile malware, Data breaches, cyber-threats and fraud The media vultures have been circling this week after BlackBerry announced plans to cut 4,500 jobs in an attempt to staunch its anticipated loss of $995m. Despite the losses though, IDG Connect’s Editorial Director, Martin Veitch, thinks that while the Canadian company might be down, it’s not necessarily out. So what’s the answer for BB? Would cracking the mobile-security code ensure its success in the future? Or is the threat of mobile malware just too big now? This week we look at how the threat of mobile malware is growing, with insight into the effects of mobile users, as well as tips for organisations on how to embrace the BYOD trend securely. Continue reading »

Google vs MS, Top 10 Cloud Backup, and others

Data breaches, cyber-threats and fraud In this issue you’ll find out the benefits of using a stable and scalable DNS infrastructure and how to support business continuity with the right network infrastructure. Plus, get a detailed comparison of Office 365 and Google Apps. Which one is right for your business?

Continue reading »

How trapped are your digital movies and TV shows?

This article on CNET is about how locked in you are to a particular service if you obtain video files from them.   Continue reading »

Google’s Remarketing for Search could have huge impact on existing remarketing approach

Greenlight Marketers urged to get on board with Google’s latest Remarketing for Search product or get left behind

Continue reading »

The Affiliate Myth

amazon affiliate myth Once upon a time, the online world known as the internet was such a new idea that very few people knew it even existed. People used it to publish and share important data and communicate between computers. Then, some bright computer developers invented software that would make it easy for everyone to use the internet … and then others invented ways of putting pictures on the internet. By the early 1990s, the internet was a fabulous world of visual communication that connected people all over America. Then someone said : “let’s use the internet to SELL STUFF… !” and the internet changed forever.

Continue reading »