Internet
Young Women Are The Most Valuable Mobile Ad Demographic
Source: http://www.businessinsider.com/young-women-are-most-valuable-mobile-ad-demographic-2012-2
Business Insider Intelligence is a new research and analysis service for real-time insight and intelligence about the Internet industry. The product is currently in beta. For more information, and to sign up for a free 30-day trial, click here.
Data is starting to trickle in and shape our understanding of the nascent mobile ad market. According to data from Flurry Analytics, 25- to 34-year-old females are the most valuable demographic for advertisers and publishers (as measured by the underlying click-through and conversion rates).
This is not surprising: Young people have adopted smartphones at a much higher rate than their parents. However, mobile CPMs will eventually even out as penetration picks up amongst older age groups. Furthermore, women should be more valuable because they historically have controlled household expenses and there is some evidence that they use smartphones more than men while shopping.
Finally, the eCPMs strike us as pretty high—even as smartphone usage has exploded, demand seems to have held up.
Feedback? Questions? Send us an email
Please follow Business Insider on Twitter and Facebook.
Join the conversation about this story »
See Also:
- Smartphone Sales Will Reach Nearly 1.6 Billion Units By 2016
- Here’s What Retail Customers Are Actually Doing With Their Smartphones
- Online Video Advertising Takes Off
Intel Creates $100 Million Fund To Make Your Car Smarter (INTC)
Source: http://www.businessinsider.com/intel-creates-100-million-fund-to-make-your-car-smarter-2012-2
Intel Capital announced today a $100 million fund devoted to cars.
So what’s a chip company doing betting on technology in cars?
Intel estimates that by 2014, cars will be one of the top three fastest-growing markets for connected devices and Internet content. That eventually gives Intel an opportunity to put more of its chips in a whole new place: cars.
As an Intel manager put it in the press release announcing the fund: “The car is the ultimate mobile device.”
The Intel Capital Connected Car Fund will invest in technologies such as advanced driver assistance systems, speech recognition, gesture recognition, and eye tracking.
But there’s no mention of self-driving cars just yet. That is all Google for now.
Dramatic Declines In Usage of Traditional News Sources; Internet The Only One Growing
Source: http://www.mediapost.com/publications/article/168697/where-did-they-hear-that.html
Campaign News Sources |
||||
|
% of Consumers Who Regularly Get Campaign News From: |
|||
Source |
2000 |
2004 |
2008 |
2012 |
Cable news |
34% |
38% |
38% |
36% |
Local TV news |
48 |
43 |
40 |
32 |
Network news |
45 |
35 |
32 |
26 |
Internet |
9 |
13 |
24 |
25 |
Local paper |
49 |
31 |
31 |
20 |
Source: Pew Research Center, January 4-8, 2012 |
Read more: http://www.mediapost.com/publications/article/168697/where-did-they-hear-that.html#ixzz1nlia383u
2.3 Million Americans Have Pulled The Plug Since 2010
This chart (below) from ISI Group tells you all you need to know about the fate of cable TV in the age of the iPad: Since Q1 2010, 2.3 million people have stopped subscribing to pay TV as delivered by cable TV companies such as Cablevision, Comcast, DirecTV, Time Warner Cable, Dish, Verizon, and AT&T.
Currently, only 41.5 million Americans watch TV on pay cable.
I’ve been arguing for a while now that Americans are on the cusp of a dramatic change in how they watch video. They’re moving to video over the internet. Traditional TV is dying, in much the same way that in the mid-2000s we all largely stopped using hardwired telephones to make calls in favor of wireless mobile cellphones.
Hardwired phones are still a big business, of course, and most households still have them. But they’re really a vestigial offshoot of whatever bundled communications package you’ve bought.
It looks like cable is about to go the same way. Although its subscriber numbers are dwindling, subscriber numbers for satellite TV and broadband phone/internet service remain relatively healthy, as the second chart (below) shows. That suggests to me that there is a growing number of households choosing a broadband package with the internet as their top priority, and a dwindling number choosing it based on TV.
Ironically, the fall has come at a time when cable is making more ad money than ever. It’s a supply-and-demand issue: It may be that cable TV’s audience is dwindling, but it’s still one of the few venues that reliably delivers millions of eyeballs all at once.
First, the cable TV chart, based on numbers from ISI Group:
Here’s the market share situation. Note that 2011 was a threshold year, when cable slipped from having more than 50 percent of the market to less:
Please follow Advertising on Twitter and Facebook.
Join the conversation about this story »
See Also:
- Does This Mysterious Mad Men Ad Reveal The Secrets Of Season 5?
- These Stunning New Bottle Designs Are Revolutionizing The Wine Business
- You Saw The Academy Awards, Now See Who Won BI’s Oscars For Ads
Read Anonymous Reviews like Graffiti
Source: http://lifehacker.com/5886582/read-anonymous-reviews-like-graffiti
Trolls. They fill the internet with insults, dead-end arguments, and inanity the likes of which we’ve never seen. Or maybe we have. The Guardian’s David Mitchell notes that trolling comments aren’t all that different from graffiti, and should likewise carry no more weight.
More specifically, Mitchell is talking less about trolls as you and I know them and more about anonymous, often inaccurate online reviews. It’s not a bulletproof analogy by any means, but Mitchell’s idea does reframe the way you look at anonymous content in a compelling way:
When you read a bit of graffiti that says something like “Blair is a liar”, you don’t take it as fact. You may, independently, have concluded that it is fact. But you don’t think that the graffiti has provided that information. It is merely evidence that someone, when in possession of a spray can, wished to assert their belief in the millionaire former premier’s mendacity. It is unsubstantiated, anonymous opinion. We understand that instinctively. We need to start routinely applying those instincts to the web.
If you read a review, an opinion, a description or a fact and you don’t know who wrote it then it’s no more reliable than if it were sprayed on a railway bridge. We should always assume the worst so that all those who wish to convince… have an incentive to identify themselves.
The flip side of the coin, of course, is that anonymity is vital to the spread of information on the internet. The important tool to remember, as always, is your skepticism. Without it, you’re letting yourself get all worked up over graffiti. (And we’re not talking Banksy here—or even Hanksy.) Photo remixed from The Awl.
An internet troll’s opinion should carry no more weight than graffiti | The Guardian
Google responds)
Source: http://www.engadget.com/2012/02/20/microsoft-finds-google-bypassed-internet-explorers-privacy-sett/
There was quite a stir sparked last week when it was revealed that Google was exploiting a loophole in a Apple’s Safari browser to track users through web ads, and that has now prompted a response from Microsoft’s Internet Explorer team, who unsurprisingly turned their attention to their own browser. In an official blog post today, they revealed that Google is indeed bypassing privacy settings in IE as well, although that’s only part of the story (more on that later). As Microsoft explains at some length, Google took advantage of what it describes as a “nuance” in the P3P specification, which effectively allowed it to bypass a user’s privacy settings and track them using cookies — a different method than that used in the case of Safari, but one that ultimately has the same goal. Microsoft says it’s contacted Google about the matter, but it’s offering a solution of its own in the meantime. It’ll require you to first upgrade to Internet Explorer 9 if you haven’t already, then install a Tracking Protection List that will completely block any such attempts by Google — details on it can be found at the source link below.
As ZDNet’s Mary Jo Foley notes, however, Google isn’t the only company that was discovered to be taking advantage of the P3P loophole. Researchers from Carnegie Mellon University’s CyLab say they alerted Microsoft to the vulnerability in 2010, and just two days ago the director of the lab, Lorrie Faith Cranor, wrote about about the issue again on the TAP blog (sponsored by Microsoft, incidentally), detailing how Facebook and others also sk! irt IE’s ability to block cookies. Indeed, Facebook readily admits on its site that it does not have a P3P policy, explaining that the standard is “out of date and does not reflect technologies that are currently in use on the web,” and that “most websites” also don’t currently have P3P policies. On that matter, Microsoft said in a statement to Foley that the “IE team is looking into the reports about Facebook,” but that it has “no additional information to share at this time.”
Update: Google’s Senior Vice President of Communications and Policy, Rachel Whetstone has now issued a statement in response to Microsoft’s blog post. It can be found in full after the break.
Microsoft finds Google bypassed Internet Explorer’s privacy settings too, but it’s not alone (update: Google responds) originally appeared on Engadget on Mon, 20 Feb 2012 16:59:00 EDT. Please see our terms for use of feeds.
Permalink ZDNet |
IE Blog | Email this | Comments
Social Gaming Revenue Will Blow Past $5 Billion By 2015
Source: http://www.businessinsider.com/social-gaming-revenue-will-blow-past-5-billion-by-2015-2012-2
In our report on social gaming out today, we forecast that the U.S. social gaming market, including smartphones, will more than double and blow past $5 billion by 2015.
We think this will happen because social games will break into the mainstream as new types of games reach new audiences, and because companies will get even better at monetizing.
Our report also includes an in-depth look at industry trends and exclusive interviews with top industry executives. Click here to read it →
Please follow BI Intelligence on Twitter.
Join the conversation about this story »
See Also:
- Facebook Is Eating The World
- The Internet’s Next Frontier
- User Engagement: Facebook’s $100 Billion Competitive Advantage
Caterina Fake Launches Pinwheel, Which Lets You Leave Notes Around The World
Caterina Fake, who previously cofounded Flickr and Hunch, has launched a new startup called Pinwheel, which lets you leave vitrtual notes around the world.
She announced the launch on her personal blog earlier today.
Enter the Internet of things, where you can choose to follow people, places or things. The notes you leave can be private, or you can share them with everything and everybody.
The possibilities seem endless.
For instance, Fake shared a note she wrote for her friend Lauren:
Perhaps this would be a more useful note when you’re roaming around town: “Find me a Nearby Toilet NOW.”
That seems to be coming soon: Fake wrote on her blog that she plans on building out a notification system so you can get pinged when someone you follow sends out a note.
We knew last year that True Ventures, SV Angel and her fund, Founder Collective, invested.
As far as making money, Fake is betting on selling sponsored notes.
The site is still in private beta — you can sign up here for an invite to try out the web and mobile app. The iOS version is coming up next.
Please follow SAI on Twitter and Facebook.
Join the conversation about this story »
See Also:
- How To Marry Your Cofounder And Not Kill Your $200 Million Startup In The Process
- Inside OkCupid Labs: The Modern Matchmakers Of Silicon Valley
- Why Gay Guys Love Using Grindr To Hook Up And Make Friends
Source: http://gizmodo.com/5884415/travelling-in-modern-china-requires-serious-secret-agent-skills
If Kenneth G. Lieberthal were anything but a China expert at the Brookings institution, his travelling-in-China security procedures would read like the product of a paranoid mind that watched too many spy movies as a kid:
He leaves his cellphone and laptop at home and instead brings “loaner” devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, “the Chinese are very good at installing key-logging software on your laptop.”
Talk about overkill, right? Well he’s not alone. The Times reports that these seemingly paranoid precautions are par for the course for just about anyone with valuable information including government officials, researchers, and even normal businessmen who do business in China.
But what about the rest of us? I may not have any valuable state secrets or research that needs protecting but that doesn’t mean I want the Chinese government snooping on my internetting when I visit my grandparents (especially when the consequences can be so severe). In the past, I’ve relied on a combination of VPNs, TOR, and password-protecting everything I can, but now it sounds like even that isn’t enough. Or maybe it’s totally overkill given my general unimportance in the grand scheme of things. Dear readers, I ask you, how much security is enough when it comes to the average person on vacation? [NY Times]
Image credit: Shutterstock/Rynio Productions
Digital Consigliere
Collaborators – Digital Profs
Pages
Popular Posts
- The JKWeddingDance video was real; the viral effect was MANUFACTURED - Post 1 of 2
- What is Web 3.0? Characteristics of Web 3.0
- Lady Gaga "Poker Face" X-Rated Lyrics Hidden in Plain Sight
- Samsung 52 inch HDTV $9.99 at BestBuy - purchase receipt below (6:21a eastern time August 12, 2009)
- Facebook advertising metrics and benchmarks
- Marketing Costs Normalized to CPM Basis for Comparison
- Technology Adoption Curves Show Much More Rapid Rise to Mainstream
- Twitter's Path To 33 Billion Tweets Per Year
- The Grand Unified Theory of Marketing(tm) - Digital String Theory
Tags
Prototype Web Services
- drag2share – quickly share news items by drag and drop on email addresses
- LivePhotoFrame – upload and remotely manage a digital photo frame via unique URL
- MedleyTuner – create a continuous listening experience by uploading mp3s
- MusicSamplr – discover new artists and music, listen to samples
- SharedMost – what links on ANY webpage are shared most?
- Signatory – sign and date a document and verify it hasn't been altered since that exact time.
- WebTeleprompter – just what it says it is
Archives
- February 2016 (2)
- January 2016 (6)
- October 2015 (2)
- September 2015 (7)
- August 2015 (6)
- July 2015 (2)
- June 2015 (5)
- May 2015 (4)
- April 2015 (32)
- March 2015 (57)
- February 2015 (79)
- January 2015 (86)
- December 2014 (69)
- November 2014 (98)
- October 2014 (150)
- September 2014 (109)
- August 2014 (44)
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (93)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (22)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)