Social Media Check-Ins Are Poised To Be The New Currency Of Mobile Advertising

Social Media Check-Ins

Subscribe to Social Media Check-Ins: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Social Media Check-Ins: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The Justice Department got a federal magistrate judge in Virginia last Friday to uphold her previous order telling Twitter to give federal prosecutors access to the accounts maintained by people close to WikiLeaks. That includes the contacts, records of activity, e-mail addresses, banking and credit card information associated with them. The government, which hasn't asked for content, is looking for evidence that WikiLeaks founder Julian Assange and his associates broke US law. It would like to tie Assange to Pfc. Bradley Manning, the US soldier believed to have sent WikiLeaks a treasure trove of classified documents. The American Civil Liberties Union, the Electronic Frontier Foundation and lawyers representing the account holders, including WikiLeaks volunteer Birgitta Jónsdóttir, now a member of Iceland's parliament, opposed the move on First and Fourth Amendment... (more)

Top 50 Bloggers on Cloud Computing

Ever since I first published here my tentative list of Top Players in the Cloud Computing Ecosystem - now expanded to a list of 250 and growing daily thanks to community feedback via my Twitter account (@jg21) and a very kind mention by ReadWriteWeb - there have been suggestions that another prism through which to view cloud computing might be that of people rather than companies. Now Michael Sheehan has encouraged me to Just Do It, so let me get started...as per the previous Top Cloud Players list, this list will a work-in-progress and is totally porous, so don't hesitate to ping or tweet me if there are folks I have missed. In particular if you are a journalist whose "beat" is Cloud Computing, please let's be hearing from you, and we can maybe widen this list from Cloud Bloggers to Cloud Commentators. For now though let's get started. In alphabetical order - to av... (more)

The Fundamental Flaw with LinkedIn Connections

Assumption A first-degree direct LinkedIn connection implies that the two parties know each well. Problem Using this assumption, two unconnected LinkedIn users attempt to connect via an intermediary. What often happens is that the first degree connections are in fact very weak connections, and thus of no use to the third party attempting to connect via the intermediary. Example I log into LinkedIn and would like an introduction to Brent. I view Brent's profile and notice that his first degree connection, Brian, is also a first degree connection with me. So I ask Brian for an introduction to Brent. Brian responds: "I met Brent few years ago, at a conference, we exchanged business cards and connected on LinkedIn. I don't know him well at all. He probably does not remember me. Sorry, don't think the introduction would be of any use." Solution I suggest that LinkedIn mo... (more)

Lessons Learned from LinkedIn

Users are making it too easy for hackers. If we take a closer look at the 6.5 million hashed LinkedIn passwords that leaked we find a large swath of the user population are ignoring warnings of overly simplistic and obvious passwords. Would you believe the most common word or phrase found in a 160K sampling of the list was “link”? And would you further shake your head in disbelief that “1234” and “12345” followed close behind. Rounding out the top 10 were “work,” “god,” “job,” “angel,” “the,” “ilove,” and “sex.” More so than Facebook, LinkedIn is the social media of choice for business. So it is likely to be used by the users in your enterprise as part of their SaaS profile. This makes their problem, your problem. If we learn anything from this debacle, it is that password management should be a priority for any organization that allows its users unfettered access t... (more)

Take Social Media Privacy Into Your Own Hands

By Steve McMaster - I’ve gotten in a lot of arguments lately about one of the latest “hot topics” in the end-user side of technology – privacy. With some of the biggest names in Social Media doing a really bad job of it (and I’m not even just talking about leaked passwords), it’s something that’s throwing itself in the face of many average, day-to-day computer users. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer. But here’s my gripe for you. Facebook has, as of April 2012, 901 million active members (according to Wikipedia). If Facebook were a country, it would be ranked 3rd in the world by population. And it seems every week, they’re in the news again, someone ranting about their privacy on Facebook. My fav... (more)

Beyond Check-Ins: Foursquare Tests Paid Ads

Social check-in king Foursquare has finally given in to the temptation of paid advertising, now allowing merchants to incorporate promotions into their check-in pages through Promoted Updates. The new pilot program is essentially the paid version of Foursquare’s Local Updates, which the company launched last week to bring news from your most-frequented locations directly to the app. “This is the first time ever that we’re allowing businesses to pay to promote their business in Foursquare,” product manager Noah Weiss told VentureBeat, calling it “a very exciting milestone” for the company. Read the full story at PC Mag. ... (more)

The Data Explosion. Are We Ready? (or Not)

Since the very beginnings of trade and commerce, it has been a commonality that most information exchange between buyer and seller, customer and business, was treated as a discrete, confidential, and almost intimate affair. Trust was earned, not given. Consider the not so distant history of the local American bank. Banks have been collecting personal information about their customers for decades, harkening back to consultations over a notepad, paper deposit slips, and hand-written applications. The reputations of applicant and banker, buyer and seller, were local reputations, with personal and professional references limited to the confines of the community and the reality of proximity. Banks large and small managed piecemeal, disconnected snapshots of personal information in random, unstructured, and ultimately inefficient processes that took place without fanfare... (more)

Google, Social and Enterprise Mobility

I would invite anyone in an IT department buried in demand for mobile apps to first take a look at Google Enterprise before trying to develop everything yourself.  There are many mobile capabilities already available in the Google world which are free to individuals and available free or on a subscription basis for companies.  Here are a few of them: Google Drive - Keep all your files, documents, spreadsheets, videos, photos, everything digital in a free secure cloud.  Access from any mobile or desktop device.http://youtu.be/wKJ9KzGQq0w Google+ - Strives to make sharing online, like sharing in person.  We at Cognizant have been using Google+ for many of our strategy groups and discussions.  I love it.  I use it for both work and personal.  I have specific "Circles" and "Communities" for work and personal. Google Hangouts - This is a very powerful solution that let'... (more)

The Changing Facets of External Communication

External communication methodology has evolved vastly in the last century, especially during the last two decades. We have witnessed the evolution in communication methodology with every new step the internet revolution has taken forward. So, we have moved from sending letters to phone calls to mobile communication via SMSes and cellular calls, emails and have finally arrived at the current scenario where communication occurs at various levels through emails, instant messaging, communicating via social networks, voice and video chats etc. Rate of Adoption of Technology The rate at which consumers have adapted to the new technology and adopted them hasn’t slackened; in fact, the pace has increased manifold. Switching from computers to laptops to Smartphones was a comparatively quick transition. To a great extent, this may be attributed to the level of awareness and ... (more)

Why Social Media Check-Ins Could Bridge the ROBO Gap

Badges, Passports, the Creator, the Founder, the Mayor, getting a Pin, picking up a raccoon..This is the language of the newest phenomenon to hit the location-enabled social media marketing world. I am talking about Social Networking Games. No longer only for geeks and geocachers, these are real tools for seeing where your friends are, in real time, as they “check-in” to locations and share what they are doing. Since the device knows where it is, you can only check in to a location you are visiting. While mobile location sharing is not new, incentives that tap our competitive side offered by a “game” are, and this makes all the difference. The “game” element is that you earn virtual rewards in the form of pins or badges to fuel participation and interaction with real locations. If, for example, you are the first to register a place you want to check-in to, you can... (more)

Social Media is Different for Regulated Industry

By D. Bruce Johnston, President & CEO, DBJ Associates We are pleased to offer our readers an on-demand link to the popular webinar: “Social Media: Can Advisors Afford to Miss It?” To hear the latest thinking from the industry leaders in financial services social media marketing — Fidelity, American Century, Socialware and Advisolocity — please click the accompanying thumbnail link. Hear Jennifer Sussman, Director of Online Marketing for American Century provide highlights from her firm’s recently completed “Financial Professionals Social Media Adoption Study.” Next, benefit from Ross Ozer’s insights. As Vice President of Marketing for Fidelity Institutional Wealth Services, Mr. Ozer comments on how social media can help advisors generate more referrals, greater marketplace awareness and extend their reach. Do you consider compliance to be a major barrier to adopting ... (more)