March 2010

Search Engine Marketing: Using Google AdWords As A Research Tool

Please enjoy the following guest post written by my friends at Top Side Media.

______________________

In our experience with search engine advertising, one of its unique aspects is that, in addition to directly generating online sales or leads, its robust settings provide an excellent tool for business research and planning. In the creation and management of search engine ads, the campaigns, ad groups, and more granular settings gather a great deal of useful data. This is particularly true for Google AdWords. When specifically set up for testing, the potential is a marketer’s dream. For example, we control the following primary variables:

Search Engine Marketing: Using Google AdWords As A Research Tool Read More »

Twitter URL Shortener: Good Response to Phishing

The news sort of came out a bit under the radar, but Twitter announced a very interesting change they are implementing on their blog (March 9, 2010). Positioned as a response to phishing, they will be changing URLs in Direct Messages to their own twt.tl shortened redirects. Essentially, they can then track for bad behavior and block the URL altogether if the target web page is found to be malicious.

Twitter URL Shortener: Good Response to Phishing Read More »

Information Security & the New Generational Gap

Since the RSA Conference is happening this week, I thought it would be different to do a piece that hits on both Real-time and Information Security. The following blog post is my own original work that appeared on The Network View, the official blog for Anue Systems, on November 12, 2009. It highlights some important sociological differences between the various generations of today’s adult population, and looks at how changing work habits and security need to find a workable balance.

Information Security & the New Generational Gap Read More »

Scroll to Top