Subscribe to Dr. Granville's newsletter

All Posts (9)

  • As social media matures, marketers have been working to figure out how to harness the channel for financial gain and data gathering. Online marketers know that social media is a great way to engage customers and that it plays an important role in customer insight. An interesting January comment from research analysts at Gartner goes something like: “By 2017 the Chief Marketing Officer (CMO) will spend more on IT Than the Chief Information Officer.” Given that so much of today’s marketing takes place through online channels, this comment seems entirely believable as IT is increasingly called upon to help not only with things like implementations, systems management, uptime, and compliance, but also with data management, collection, and analysis.…

    Read more…
  • One of the challenges in our “bring your own device” (BYOD) and “use your favorite online tools at work” culture, which is the reality today, is the burden of organizations needing to stay compliant and maintain control of shared data. While enabling employees to be productive is vital to business, so is being complaint and ready to respond to potential e-discovery calls.

    It is widely believed that if a company tries to put restraints on employees, that increasingly tech-savvy employees find a work around to enable the use of the preferred tool, file sharing method, or the like. In response to this, more and more solution providers are trying to secure the favorites to close the gap between employees selected or desired tools and IT compliance constraints.

    In addition to the concern that…

    Read more…
  • Users lose control of Facebook, email, Gmail, Yahoo!, Twitter and other online accounts frequently. agreed representatives from Microsoft, Twitter, Yahoo!, Responsys and Dropbox during a breakout session at the Online Trust Forum 2012 held earlier this month. While all the companies actively patrol for anomalies and conduct behavior analysis, breaches still happen, and while no one on the panel (nor among the who’s who in the audience) wanted to stake out a firm number, they agreed it was in the ballpark of hundreds of thousands each day. That number is plausible if you stop to recall this summer’s Yahoo! breach where over 450,000 accounts were hacked in one go.

    Ramses Martinez, director of security at Yahoo! did not talk specifically to the breach,…

    Read more…
  • Why You Must Manage Social Media

    There is an interesting CNBC article out today that discusses the increased attention that the FBI is giving to tweeters in the financial services industry. Key points from the article:

    • A growing number of hedge fund managers and others in financial services firms are using Twitter to share their views on companies, stocks, news, etc.
    • As a result, FBI agents are actively searching Twitter and Facebook for evidence of securities fraud.
    • One study found that Twitter can predict moves in the Dow Jones Industrial Average two to six days in advance with a remarkable accuracy of 87.6%, making tweets an increasingly important source of “inside” information about stocks,…
    Read more…
  • A common role for IT is that of watch guard for users, endlessly trying to educate and train on best practices for security, privacy and regulatory compliance. Making that IT role all the more challenging is bring your own device and social networking trends; both have increasingly opened the door to users’ potential for widespread sharing of personal and company information. Is it possible that some of the training and education is becoming so mainstream that it is being echoed outside the business realm? According to a recent Pew Internet & American Life Project report published this month, parents are acutely aware that teenagers have an online presence and 81 percent are concerned about it. Over half the parents…

    Read more…
  • An Interesting Cloud-Based Intranet Offering

    I was recently briefed on Jostle’s People Management platform, an offering that the company refers to as an intranet, but that many might consider to be an enterprise social platform. Jostle’s platform is an interesting offering for several reasons:

    • Unlike SharePoint that has a document-centric focus with social capabilities also built-in, Jostle’s People Management platform has a social/people focus that also has document capabilities built-in. For example, Jostle’s offering has a photo wall that presents the images of everyone in the organization. Users can search across all employees by name, role, location, skill set, etc. Clicking on an image presents contact and other information about that individual, such as tags…
    Read more…
  • Strikes multiple partnerships with operators to encourage usage.

    Very interesting post first posted by Zen Terrelonge 

    These days Mark Zuckerberg enjoys touting Facebook as 'a mobile company,' and with MWC underway the social network is trying to enhance adoption of its mobile Facebook Messenger service.

    The company has sealed deals with more than 18 operators in 14 countries – Three in Ireland, Airtel in India, Etisalat in Egypt – to offer free or discounted access to users of the IM service across iOS, Android and other compatible devices.

    Talking up stats, Facebook, said: "Three out of every four people on Facebook send a message on the platform each month, making messaging one of the most popular activities on Facebook.

    "Today, Facebook messaging and chat can be accessed from more than 6,000 mobile phones via Facebook Messenger, Facebook for iOS and…

    Read more…
  • Since acquiring On2 Technologies in 2010, Google has been waging a battle to unseat the popular h.264 video codec with VP8, a technology it acquired with the On2 acquisition that it intends to release as open-source, royalty-free software. At issue is the cost and ubiquity of video online and in phones and mobile devices.

    Video codecs encode and decode video and audio date for more efficient streaming and to reduce storage requirements. Few people care about how they work, and the patent cost of codecs is generally transparent to users and equipment buyers. The h.264 codec’s wide adoption has accompanied the huge growth of online video, and the companies that embed h.264 in DVDs and Blu-Ray discs and disc players, web browsers, video cameras, and mobile phone processors pay royalties to MPEG LA, which licenses a pool of patent.

    Last month, Google quietly reached an agreement with MPEG LA that results in 11 of the 12 companies claiming VP8 infringes their existing video…

    Read more…
  • Book: Steganography in Digital Media

    Images with secret, hidden, embedded content are typically spread across social media.

    Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the…

    Read more…
    • Comments: 0
    • Tags:
RSS
Email me when there are new items –

Messaging Events

Security
Tech