Last year, when I first started poking around in social media from my security high horse, people asked me what it was like to live in two totally different worlds. Keep in mind I'm no technology thought leader, hacker or researcher -- but I've been working in security for the better part of 10 years and I respect all aspects, from all the different shades of security hats.
Eileen Brown delivers news on social media tools and trends and deep dive into business strategies.
Eileen Brown is a social media consultant and advisor who has been working with collaborative technologies for over 20 years.
* Jennifer Leggio is on vacationGuest editorial by Rick BurnesDespite plenty of discussion about their virtues, business blogs have yet to capture the attention of readers. Most business blogs are still regarded as the voices of companies, not legitimate content sources.
By now everyone knows about the phishing scam that started attacking Twitter over the weekend. And most everyone else knows that a majority of those accounts have been harvested and are using DMs to push people to potential drive-by-malware sites.
* Jennifer Leggio is on vacationGuest editorial by Justin Cooper Gartner's Adam Sarner recently released a report predicting that more than 60 percent of all companies will have a community for engaging their customers by 2010. This is a clear sign that many brands are coming to terms with the huge opportunity that social media offer companies to communicate directly with and learn from their customers, but it still begs the question of how they will get tangible ROI out of these communities.
Social networking helps you bypass the anonymity that accompanies submitting your resume amongst thousands submitted for one job opening through an online site or recruiters or in response to a classified ad.
I've had several discussions with my Twitter pals over the last year about how being forced to fit our thoughts into 140 characters or less has made us slightly more succinct elsewhere. For me, quite frankly, that is a miracle.
When I compiled my crowdsourced 2009 predictions earlier this month, several people shared with me the same forethought: URL redirection leveraged by phishers could create a bottoming out of sorts for Twitter. The concern is that masked URLs could lead to stolen data or drive-by-malware, making it too late for the poor user who clicks the link once he or she figure out what happened.
If you're trying to determine who to read and who to follow and who to potentially hire to guide your business to social media success, consider the fundamental principles of business decision-making.
* Jennifer Leggio is on vacationGuest editorial by Michael GainesDo you remember Venn diagrams from high school math? Those are the overlapping circles which represent where two groups intersect.
If you win a Shorty Award, you can forever be known for your ability to influence in bursts of 140-characters or less.