There has been quite the uproar the past few days, after Google announced that they are moving 100% of search queries from unencrypted to Secure Search. When this news broke on September 23, the SEO world had a collective panic attack. But is this really the end of SEO as we know it? Google Secure Search: What Is It? Google… read more →
WordPress is our CMS of choice for most small- to mid-sized businesses. There are a slew of benefits, from putting web content management in the hands of non-technical staff to providing a platform to launch a site in a short timeframe. It does come with some downside, though. When a platform is built and maintained via the community (a.k.a. open… read more →
Enjoy today’s guest post by freelance writer Becky Wilcox. Over the last 10 years, social media sites have been growing rapidly. They have become a main way to connect and communicate for individuals, and the youth of today, having grown up with this as their “normal”, are always connected. But there are dangers and concerns from being so openly exposed.… read more →
Social networks are the backbone of social media, the places where we can virtually gather with likeminded professionals in different companies, locations, and industries. Leading platforms such as Facebook, LinkedIn, and Google+ are well known and understood. And they serve a great purpose for the vast majority of us. From the perspective of the enterprise, however, public social networks are… read more →
It finally happened to me. I never thought it would, but it sure did.
What am I talking about? Information Overload
The news sort of came out a bit under the radar, but Twitter announced a very interesting change they are implementing on their blog (March 9, 2010). Positioned as a response to phishing, they will be changing URLs in Direct Messages to their own twt.tl shortened redirects. Essentially, they can then track for bad behavior and block the URL altogether if the target web page is found to be malicious.
Last week while traveling to San Francisco for the RSA Conference 2010, I finally took the time to figure out how to use TwitPic from my mobile phone. It was like a revelation! For those of you who follow me, you may have seen as I posted various photos from the trip out there, my dinner the first night, etc. I had a shiny new toy!
Since the RSA Conference is happening this week, I thought it would be different to do a piece that hits on both Real-time and Information Security. The following blog post is my own original work that appeared on The Network View, the official blog for Anue Systems, on November 12, 2009. It highlights some important sociological differences between the various generations of today’s adult population, and looks at how changing work habits and security need to find a workable balance.