September, 2010

article thumbnail

Stop It. Google Won't Buy Twitter.

John Battelle's Searchblog

( image ) Today I landed from a trip to the world of the non-tech obsessed (PA and OH) to find my newsfeed was full of speculation that Google MUST buy Twitter , or be damned to obscurity in a race its already losing to Facebook. Not so fast. Here's my simple reasoning for why Google won't buy Twitter: Twitter won't sell. Those who decide whether Twitter goes to Google pretty much come down to a handful of folks: Founders Evan Williams, Jack Dorsey, and Biz Stone, with COO Dick Costolo and Twitt

IT 111
article thumbnail

The Socialist Revolution is Coming!

Collaboration 2.0

nGenera relaunched their company and software packages this week, renaming themselves ‘Moxie Software‘ (with ‘nGenera Insights‘, their research and consulting arm, continuing as a sub brand). We’re in the thick of the fall conference season now, and this announcement was probably timed to coincide with Jive Software’s ‘Jive World‘ social business customer conference.

96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ACS:Law Could Face the First UK Fine for a Data Breach

Hunton Privacy

The UK Information Commissioner’s Office (the “ICO”) has indicated that UK law firm ACS:Law could face a maximum penalty of £500,000 following a major data breach. Personal information, including names and addresses, of over 8,000 Sky broadband subscribers and 400 PlusNet users was made publicly available following an apparent attack on ACS:Law’s website.

article thumbnail

IE8 CSS-based forced tweeting

Scary Beasts Security

A few weeks back, I published a demo that uses a serious Internet Explorer cross-origin violation to permit a malicious web page to force the visitor to make unwarranted tweets: [link] The post was light on technical details of how the attack works, so they will be filled in below. In addition, I'll quickly take care of the FAQ: Q) Does this attack affect earlier versions of Internet Explorer, such as IE6?

IT 20
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

More Thoughts On Demand: A Referendum of Sorts on Google and Social

John Battelle's Searchblog

It's been nearly a month since Demand filed its S1 , and I promised you all a longer look after my initial posting. Here are some thoughts now that I've had a chance to digest the document. A caveat: I know Demand CEO Richard Rosenblatt well, and consider him a friend. And one of his investors, Oak, is an investor in my company, Federated Media. However, neither Oak nor Richard participated in the preparation of this post.

More Trending

article thumbnail

Currency

John Battelle's Searchblog

I'm very proud of a new platform launched today by American Express: Currency. Sometimes when a brand embraces the concept of truly being a publisher, they align with strong voices around the web, underwriting existing properties and helping them create new sections or services. But every once in a while, a brand realizes that its marketing goals align with a very real need in the marketplace, one that for whatever reason hasn't been addressed.

article thumbnail

That Was Fast: TellApart Implements A Searchblog Suggestion

John Battelle's Searchblog

Earlier this week I mused out loud about retargeting, suggesting that perhaps it's time for marketers to not just chase folks around the web in hopes they might irritate us into submission , but rather offer us the chance to politely say "Not right now, thanks.". One of Searchblog's readers turned out to be Josh McFarland, CEO of remarketing startup TellApart.

Retail 96
article thumbnail

Dot Com Bust: Ten Years After.

Collaboration 2.0

It’s ten years since the dot com bubble began to seriously deflate; the financial climax had its high water mark on March 10, 2000 when the NASDAQ peaked at 5132.52. By September of that year people were starting to feel a lot less financially irrationally exuberant and started heading for the [.

IT 94
article thumbnail

Bill Kutik on HR Collaboration Options

Collaboration 2.0

A recording of a Skype conversation with Bill Kutik, the eminent independent Human Resources technology analyst who co-chairs the upcoming September 29 annual HR Technology Conference in Chicago. As chair of the HR track for the upcoming November Enterprise 2.0 conference I wanted to tap Bills’ expertise, and to discuss the state of the market.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Instant: The Headlines and Quick Takes

John Battelle's Searchblog

Google today introduced what many are calling a major evolution in search interface today, sparking a landslide of commentary about the impact on SEO, mobile, competitors, search share, revenue, you name it. It's a lot to digest, and as much as I'd like to have a definitive statement on Google's move to "instant search," I don't. Yet. I prefer to use it for a while, and think on it a bit more.

IT 89
article thumbnail

Happy Bday, Google

John Battelle's Searchblog

Google is 12 today , as Sept. 27 marks the anniversary of the company's actual incorporation. Of course the company has roots prior to the date, but ya gotta pick a date. Happy birthday Google, as they say in China, may you live in interesting times.

83
article thumbnail

The Web 2.0 Summit Program Is Live

John Battelle's Searchblog

I'm very proud to announce the initial 2010 Web 2.0 Summit program. You can see the lineup on the Summit site here. Our 2010 theme Points of Control , helped us create a lineup that is truly remarkable, full of industry titans and insurgents alike. Alongside policy leaders such as Julius Genachowski , Chairman of the FCC, we'll hear from the Internet's most powerful CEOs: Google's Eric Schmidt , perhaps the most active player in our points of control map -- defending the company's home turf of s

article thumbnail

Nielsen: Bing Overtakes Yahoo In Search Share

John Battelle's Searchblog

Way back in January, I predicted (see #8) that Microsoft's Bing would overtake Yahoo in share to become #2 in search. Today, at least one measurement service seems to have validated that claim, which at the time was a bit far-fetched, given the nearly seven point gap in share between the two companies. These figures do not consider the Yahoo/Bing's search deal.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Yahoo Style Guide: Finding a Consistent, Concise Voice Online

Collaboration 2.0

Struggling to find a consistent voice online, or not sure about how to achieve appropriate language usage? Here’s Chris Barr discussing his Yahoo Style Guide, a book and online resource which helps demystify how to communicate effectively and consistently in this digital age. The Twitter era of ever faster and more fragmented real time information nuggets, [.

article thumbnail

It's All The Web

John Battelle's Searchblog

Fred points out apps and services that are " Mobile First Web Second." I don't like the distinction. To me, it's all the web. It's this kind of thinking that leads to Wired's ill-considered proclamation that "the Web is dead." (I debate that in the second half of this thread here ). What, after all, is the web, really? To me, it's a set of standards that allow for interconnection, sharing of experience and data, navigation between experiences, and a level playing field for anyone to create value

IT 72
article thumbnail

Comscore Search Results for August: Different from Nielsen

John Battelle's Searchblog

Comscore's search results are out for August , and unlike Nielsen , they do not show Bing as beating Yahoo. On the contrary, Yahoo gained the most ground, Google lost share (by not growing as quickly), and Microsoft grew only slightly.

71
article thumbnail

Google and AOL Renew Pact

John Battelle's Searchblog

One of the best cards in AOL's difficult hand has been its search deal with Google, which was up for renewal this year. This morning the two companies announced (ahead of a December deadline) that they were staying together, though I can only imagine the folks at Bing didn't make it easy. At the moment, only three parties know what Google paid - Google, AOL, and Microsoft, which knows at least what Google must have topped to win the deal.

IT 69
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Last Week of Signal

John Battelle's Searchblog

For those of you in RSS land who often ask, here are last week's Signal roundups - a daily dose of what I'm reading and thinking about each day, posted on the FM site, usually late at night. You can get the RSS feed here , or get it via email here. Monday Signal: This Is Only An Eye Test. Friday Signal: All Is True, And Quite Fictional. Thurs. Signal: Bubble, No Bubble, Toil and Trouble.

IT 67
article thumbnail

Bing Targets Firefox, Chrome Users For IE Upgrade - But Not Safari

John Battelle's Searchblog

Back in the day, it was news when Google used its massive home page distribution to push its new Chrome browser. Google putting ads on its home page?! A big deal, even if they were for Google's own products. It spoke to an ongoing creep inside the company of leveraging its position in search to help it win in other markets, and to some, it felt like a violation of Google's own principles in the process.

article thumbnail

FTC Consumer Protection Head Shares New Vision for Consumer Privacy

Hunton Privacy

David Vladeck, the head of the Bureau of Consumer Protection at the Federal Trade Commission, shared his vision for consumer privacy protection with an audience at the IAPP’s Privacy Academy on September 30, 2010. Mr. Vladeck began by reminding the audience that the FTC is aggressively enforcing on privacy and data security matters, having brought 29 cases to date.

Privacy 40
article thumbnail

Speaking around the World

Hunton Privacy

Please join us at these great events coming up this fall. Several members of Hunton & Williams’ Privacy and Information Management team are presenting at these events to discuss the current and evolving privacy and data security issues occurring around the world. Internet Rights and Technology: A Practical Legal Guide to Doing Business on the Internet – New York City Bar.

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Global Privacy Enforcement Authorities Launch Cooperative Network and Website

Hunton Privacy

The United States Federal Trade Commission (“FTC”) recently joined forces with privacy authorities from eleven other countries to launch the Global Privacy Enforcement Network (“GPEN”), which aims to promote cross-border information sharing and enforcement of privacy laws. On September 21, 2010, GPEN unveiled its new website, www.privacyenforcement.net , designed to educate the public about the network.

Privacy 40
article thumbnail

Council of Europe Prepares to Review Convention 108

Hunton Privacy

The Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (generally referred to as “Convention 108”), enacted in 1981, is the only legally-binding international treaty dealing with privacy and data protection. The Convention is also of fundamental importance in providing the underlying legal framework for instruments such as the EU Data Protection Directive 95/46.

article thumbnail

Parental Control Software Developer to Pay $100,000 for Children’s Privacy Violation

Hunton Privacy

On September 15, 2010, New York State Attorney General Andrew Cuomo announced a $100,000 settlement with EchoMetrix, a developer of parental control software that monitors children’s online activity. The settlement comes one year after the Electronic Privacy Information Center (“EPIC”) alleged in a complaint to the Federal Trade Commission that EcoMetrix was deceptively collecting and marketing children’s information.

Privacy 40
article thumbnail

Appeals Court Finds Employee Who Auto-Forwarded Supervisor’s Emails Violated Wiretap Act

Hunton Privacy

The United States Court of Appeals for the Seventh Circuit has rejected a defendant’s argument that the Wiretap Act’s prohibition on interception of communications applies only to an acquisition that is contemporaneous with the communication. In United States v. Szymuszkiewicz , No. 07-CR-171 (7th Cir. Sept. 9, 2010) , the defendant faced criminal charges under the Wiretap Act for having implemented an automatic forwarding rule in his supervisor’s Outlook email program that caused the workplace

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Updates on Federal Cybersecurity Legislation

Hunton Privacy

The United States Congress is currently considering several bills addressing cybersecurity issues. Below are brief summaries of four such bills. The Grid Reliability and Infrastructure Defense (“GRID”) Act. The GRID Act was passed by the House of Representatives on June 9, 2010. This bill would amend the Federal Power Act to grant the Federal Energy Regulatory Commission (“FERC”) authority to issue emergency orders requiring critical infrastructure facility operators to take actions necessary t

article thumbnail

Connecticut Insurance Department Issues Five-Day Breach Reporting Requirement

Hunton Privacy

On August 18, 2010, the Connecticut Insurance Department (the “Department”) issued Bulletin IC-25 , which requires entities subject to its jurisdiction to notify the Department in writing of any “information security incident” within five calendar days after an incident is identified. In addition to providing detailed procedures and information to be included in the notification, the Bulletin states that the Department “will want to review, in draft form, any communications proposed to be made”

article thumbnail

Catching Up On the Signal

John Battelle's Searchblog

For those of you who haven't signed up for the Signal newsletter (shame on you, really), it's my daily roundup of what's happening in the world of media, marketing, and platforms. You can get it via RSS or email here (sign up for the newsletter in upper right hand corner). As I do from time to time, here's the last week or so for all you RSS readers.