Archive for March 2010

Search Engine Marketing: Using Google AdWords As A Research Tool

Please enjoy the following guest post written by my friends at Top Side Media.

______________________

In our experience with search engine advertising, one of its unique aspects is that, in addition to directly generating online sales or leads, its robust settings provide an excellent tool for business research and planning. In the creation and management of search engine ads, the campaigns, ad groups, and more granular settings gather a great deal of useful data. This is particularly true for Google AdWords. When specifically set up for testing, the potential is a marketer’s dream. For example, we control the following primary variables:

Read More

BS Bingo No More: Myself

Earlier this week I was talking to some colleagues of mine about “corporate speak”. You know what I’m talking about…all of those made up words that aspiring young professionals in big companies use to try to sound smarter. Surely you’ve seen resumes, proposals, or other business documents that were littered with nonsensical words, most of them of many syllables and tenuous definition.

Read More

Twitter URL Shortener: Good Response to Phishing

The news sort of came out a bit under the radar, but Twitter announced a very interesting change they are implementing on their blog (March 9, 2010). Positioned as a response to phishing, they will be changing URLs in Direct Messages to their own twt.tl shortened redirects. Essentially, they can then track for bad behavior and block the URL altogether if the target web page is found to be malicious.

Read More

Social Media: Think Before You Tweet

Last week while traveling to San Francisco for the RSA Conference 2010, I finally took the time to figure out how to use TwitPic from my mobile phone. It was like a revelation! For those of you who follow me, you may have seen as I posted various photos from the trip out there, my dinner the first night, etc. I had a shiny new toy!

Read More

Information Security & the New Generational Gap

Since the RSA Conference is happening this week, I thought it would be different to do a piece that hits on both Real-time and Information Security. The following blog post is my own original work that appeared on The Network View, the official blog for Anue Systems, on November 12, 2009. It highlights some important sociological differences between the various generations of today’s adult population, and looks at how changing work habits and security need to find a workable balance.

Read More