Blog

Home Blog Page 3

Latest Blog Entries

 

IDG Contributor Network: Globalizing the right to be forgotten sets a dangerous precedent

admin
On March 24, the French privacy regulator, Commission Nationale de l’Informatique et des Libertés (CNIL), fined Google 100,000 Euros and confirmed its intent to globalize the European right to be forgotten. Expanding this European privacy rule has unsettling implications for...
Read More

New Azure tool helps IT tame SaaS apps

admin
More organizations are moving their data out of their data centers and into the cloud, which complicates IT’s efforts to keep track of applications in use. With the new Microsoft Cloud App Security within Microsoft Azure, IT and security teams can...
Read More

IDG Contributor Network: You shall not PaaS!

admin
Each year, data and security breaches make big splashes in the headlines. In 2013, an attack against retail giant Target affected more than 40 million customers. A 2010 attack against the Sony PlayStation Network compromised 77 million accounts. The Identity...
Read More

Google makes AdWords Products tab more useful for Shopping campaigns

admin
In addition to new Products columns, inventory data comes to the Products group tab and Reports Editor gets Shopping attributes. The post Google makes AdWords Products tab more useful for Shopping campaigns appeared first on Search Engine Land. Please visit...
Read More

Seeking investments from Microsoft & Amazon, HERE’s owners signal intent to compete aggressively with Google Maps

admin
Car maker consortium seeks additional funds, resources to further develop and grow the mapping platform. The post Seeking investments from Microsoft & Amazon, HERE’s owners signal intent to compete aggressively with Google Maps appeared first on Search Engine Land. Please...
Read More

Apple fixes iOS lock screen bypass that gives attacker access to photos, contacts

admin
Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos. The bypass technique was discovered by researchers...
Read More

Apple fixes iOS lock screen bypass that gives access to photos, contacts

admin
Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos. The bypass technique was discovered by researchers...
Read More

How to map keyword strategy to B2B buyer intent

admin
To ensure that you’re providing content that aligns with business objectives, columnist Derek Edmond recommends basing your keyword strategy on stages of the buyer journey. The post How to map keyword strategy to B2B buyer intent appeared first on Search...
Read More

Brand bidding & PPC optimization: enforcement options (Part 6 of 8)

admin
In part 6 of her multi-part series on brand bidding for paid search, columnist Lori Weiman breaks down the legal issues surrounding trademark infringement in paid search ads. The post Brand bidding & PPC optimization: enforcement options (Part 6 of...
Read More