nightmare
Your Instagram Data Is Now Officially Facebook Data
Source: http://gizmodo.com/5969001/your-instagram-data-is-now-officially-facebook-data
A new Instagram privacy policy goes into effect on January 16th, 2013. The service will now be sharing your data with its new owner Facebook. Get used to it.
Basically, Instagram has updated a few of the subhead sections of its policy to reflect the fact that it is a part of Facebook now. Instagram can now share information like cookies, log files, device identifiers, location data, and usage data,with “with businesses that are legally part of the same group of companies that Instagram is part of.” According to the Instagram blog, it’s a wonderful thing for you:
Our updated privacy policy helps Instagram function more easily as part of Facebook by being able to share info between the two groups. This means we can do things like fight spam more effectively, detect system and reliability problems more quickly, and build better features for everyone by understanding how Instagram is used.
Less spam? Great! Of course, this also means that Instagram is heaping its data over with the privacy nightmare that’s Facebook. The data will definitely be used to target better advertising at you on Facebook, and to serve you advertisements on Instagram whenever that starts happening. Here is the relevant section from the new policy:
Affiliates may use this information to help provide, understand, and improve the Service (including by providing analytics) and Affiliates’ own services (including by providing you with better and more relevant experiences).
This was inevitable, but at least now it’s official. [Instagram via TechCrunch]
This Chart Is A Complete Nightmare For Marissa Mayer And Yahoo (YHOO)
Stifel analyst Jordan Rohan put out a note this morning reducing estimates for Yahoo’s financials in the third quarter “and beyond.”
The main reason?
Yahoo’s search share is tanking at an alarming rate.
That’s a problem because search is a pure profit center for Yahoo. Rohan decreased his Q3 revenue projection for Yahoo $80 million and his EBITDA projection $70 million.
Here’s a chart based on ComScore data of Yahoo’s core search “growth”:
Yahoo outsources search tech and search monetization, and Yahoo.com isn’t growing much at all.
You might think that this kind of atrophy is normal for a company in that position. You’d be wrong.
Look at AOL, which outsources search to Google:
And look at Ask, which also uses Google:
The silver lining for Yahoo, YHOO owners, and Mayer is this: Looking at AOL and Ask reveals search growth can turn around.
It might help for Yahoo to switch to Google. The DoJ barred Yahoo from doing that back in 2009, but it’s obviously a different era ! now.
Please follow SAI on Twitter and Facebook.
Join the conversation about this story »
If You Use Any Of These 25 Passwords On Your Computer You Better Change Them Now
Remember how all those lazy Subway managers caused millions of dollars to be stolen from customers?
A band of hackers was able to guess the passwords to their point-of-sale systems and went to town nabbing credit and debit card numbers from everyone who walked into the restaurants.
Don’t let that happen to you, people.
The Internet Crime Complaint Center just released 25 of the most commonly hacked passwords of 2011.
It boggles the mind to think people are still using these everyday words [e.g.: Monkey, football, 123456) to protect devices that hold all their financial data – especially in the workplace.
Raise your virtual hand if your employer assigns workers a single password to access company databases, content management systems or email accounts. (See 11 ways to protect yourself when shopping online.)
“Sharing passwords among users in a workplace is becoming a common theme to continue the flow of operations,” the ICCC says, but “users have prioritized convenience over security when establishing passwords.”
Here’s the full list of passwords to avoid:
- password
- 123456
- 12345678
- qwerty
- abc123
- monkey
- 1234567
- letmein
- trustno1
- dragon
- baseball
- 111111
- iloveyou
- master
- sunshine
- ashley
- bailey
- passw0rd
- shadow
- 123123
- 654321
- superman
- qazwsx
- michael
- football
Now see the dirty dozen internet scams to watch out for this holiday season >
Please follow Your Money on Twitter and Facebook.
Join the conversation about this story »
See Also:
- Eastern European Scammers Made Off With $4 Million In One Of The Shadiest Used Car Schemes Ever
- Can’t Afford A Dietitian? Here Are 2 Cheaper Alternatives
- TRUE CONFESSION: This Is My $600 New Year’s Eve Nightmare
—
drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)
If You Use Any Of These 25 Passwords On Your Computer You Better Change Them Now
Remember how all those lazy Subway managers caused millions of dollars to be stolen from customers?
A band of hackers was able to guess the passwords to their point-of-sale systems and went to town nabbing credit and debit card numbers from everyone who walked into the restaurants.
Don’t let that happen to you, people.
The Internet Crime Complaint Center just released 25 of the most commonly hacked passwords of 2011.
It boggles the mind to think people are still using these everyday words [e.g.: Monkey, football, 123456) to protect devices that hold all their financial data – especially in the workplace.
Raise your virtual hand if your employer assigns workers a single password to access company databases, content management systems or email accounts. (See 11 ways to protect yourself when shopping online.)
“Sharing passwords among users in a workplace is becoming a common theme to continue the flow of operations,” the ICCC says, but “users have prioritized convenience over security when establishing passwords.”
Here’s the full list of passwords to avoid:
- password
- 123456
- 12345678
- qwerty
- abc123
- monkey
- 1234567
- letmein
- trustno1
- dragon
- baseball
- 111111
- iloveyou
- master
- sunshine
- ashley
- bailey
- passw0rd
- shadow
- 123123
- 654321
- superman
- qazwsx
- michael
- football
Now see the dirty dozen internet scams to watch out for this holiday season >
Please follow Your Money on Twitter and Facebook.
Join the conversation about this story »
See Also:
- Eastern European Scammers Made Off With $4 Million In One Of The Shadiest Used Car Schemes Ever
- Can’t Afford A Dietitian? Here Are 2 Cheaper Alternatives
- TRUE CONFESSION: This Is My $600 New Year’s Eve Nightmare
—
drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)
Here’s The Math Formula For Structuring A Groupon Deal That Doesn’t Lose Money (GRPN)
We’ve all heard the nightmare stories about Groupon merchants who lost tons of money because they were suddenly overwhelmed with thousands of customers whom they were forced to serve at a loss: The British bakery that made 102,000 cupcakes. The Irish hairdressers whose customer base now consists entirely of people who only want their hair cut a discount. The Portland cafe that lost $8,000 because the owner failed to cap the number of deals she offered.
It’s not just Groupon, of course. There are loads of other daily deal sites — Living Social, Thrillist, Google Offers, etc — but they all present merchants with the same problem: The conflict between offering below-cost deals to customers in hopes of attracting long-term “regulars” and structuring a deal so that you can still make a profit. The math can be tricky because merchants have to account for two different sets of discounts: The discount to the customer and share of the payment taken by the daily deal site for publicizing the offer.
Now TheDealMix, a site that aggregates daily deals into an impressively complicated map of your neighborhood, has produced an infographic that can help businesses calculate daily deal offers so th! at they won’t accidentally go bankrupt.
And, yes, The DealMix has presented its formulas in the form of cupcakes — particularly useful given the number of bakery-related Groupon disasters that have made the headlines.
The formulas include:
Offer Price – Cost of Goods > $0
Average Customer Spend – Value of Offer + Price > Cost of Goods
See the rest of the story at Business Insider
Please follow Advertising on Twitter and Facebook.
See Also:
- Groupon Allegedly Hacked Merchant’s Email To Alter Contract
- The Facebook Advertising Hall Of Fame: Here’s Who Is Nailing It On The Social Network
- Will Ferrell Has Made At least 19—Nineteen!—Insane Old Milwaukee Ads
—
drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)
How many users does Blippy have now?
In the wake of the PR nightmare/stroke-of-genius are there only 23,700 exhibitionists left for blippy.com (the site that lets users publish every single transaction from their credit card statement live)?
http://bit.ly/93Kpdy
NYTimes Article: http://nyti.ms/9ZK0M9
Digital Consigliere
Collaborators – Digital Profs
Pages
Popular Posts
- What is Web 3.0? Characteristics of Web 3.0
- The JKWeddingDance video was real; the viral effect was MANUFACTURED - Post 1 of 2
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- Samsung 52 inch HDTV $9.99 at BestBuy - purchase receipt below (6:21a eastern time August 12, 2009)
- Facebook advertising metrics and benchmarks
- Marketing Costs Normalized to CPM Basis for Comparison
- The Grand Unified Theory of Marketing(tm) - Digital String Theory
- Twitter's Path To 33 Billion Tweets Per Year
- The Perfect Babe - Megan Fox (pics)
Tags
Prototype Web Services
- drag2share – quickly share news items by drag and drop on email addresses
- LivePhotoFrame – upload and remotely manage a digital photo frame via unique URL
- MedleyTuner – create a continuous listening experience by uploading mp3s
- MusicSamplr – discover new artists and music, listen to samples
- SharedMost – what links on ANY webpage are shared most?
- Signatory – sign and date a document and verify it hasn't been altered since that exact time.
- WebTeleprompter – just what it says it is
Archives
- February 2016 (2)
- January 2016 (6)
- October 2015 (2)
- September 2015 (7)
- August 2015 (6)
- July 2015 (2)
- June 2015 (5)
- May 2015 (4)
- April 2015 (32)
- March 2015 (57)
- February 2015 (79)
- January 2015 (86)
- December 2014 (69)
- November 2014 (98)
- October 2014 (150)
- September 2014 (109)
- August 2014 (44)
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (93)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (22)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)