internet - News, Features, and Slideshows

Features

  • Why Instagram started banning hashtags (and why it's a bad idea)

    Policing social media sites is no easy task, because users can post almost anything they want, often without consequence. Other users can report inappropriate content, but it's not possible for social networks to remove every post that violates their guidelines.

    Written by Lauren Brousell12 Aug. 15 23:55
  • Why you shouldn't accept every LinkedIn connection invite

    Next time you receive an invitation to connect on LinkedIn from someone unfamiliar, think twice before you accept. This is not only sound advice, it's part of LinkedIn's official rules. Section 8.2 of the site's user agreement specifies that members agree not to "invite people you do not know to join your network." While Facebook and Twitter are great for broadcasting random thoughts and bragging about your private life to complete strangers, LinkedIn is designed to be personal and relevant to your professional life.

    Written by Matt Kapko10 Aug. 15 23:42
  • Government CIOs fret over apps reliability in the cloud

    Government CIOs in states and local districts increasingly are looking to push applications to the cloud, but security and a reliable user experience remain principal challenges, a new survey reports

    Written by Kenneth Corbin03 Aug. 15 23:27
  • Predicting winners and losers in the EMV rollout

    We're just a couple months shy of the big EMV liability shift. That's when companies that don't accept chip-enabled debit and credit cards take on financial responsibility for hacks and fraud.

    Written by Jen A. Miller27 July 15 23:34
  • 7 social media mistakes job seekers must avoid

    Social media can be a fun part of your day. You get to interact with friends, family and strangers -- and maybe if you're lucky, get a retweet from your favorite celebrity. But as much as you may like to put yourself out there, it can be easy to forget that your public social media accounts are just that: public.

    Written by Sarah K. White24 July 15 00:15
  • Why the open source business model is a failure

    Open source software companies must move to the Cloud and add proprietary code to their products to succeed. The current business model is recipe for failure.

    Written by Paul Rubens06 July 15 23:27
  • Social media sites still don't do enough to combat abuse

    Every day, countless individuals and groups are victimized on social networks. The abusers, detached and cloaked in anonymity, often take on different personas as they shame, troll, incite and denigrate others with relative impunity. The ramifications can be devastating and, until recently, the majority of social media companies failed to acknowledge -- let alone confront -- the vulgarity and vicious threats that fly so freely on their platforms.

    Written by Matt Kapko01 July 15 23:13
  • Why Twitter Cards are key to social media marketing

    Twitter Cards are one of the core features of Twitter's platform. However, if you aren't aware of them or confused by what they do, you're not alone. Twitter Cards enable developers for brands, publishers and other businesses to add photos, videos and a richer media experience to tweets. Marketers see them as a tool to boost their business in varying ways while users just see the better experience they provide in their timeline.

    Written by Matt Kapko23 May 15 01:01
  • Why you should use LinkedIn Pulse to self-publish

    Online self-publishing isn't the bore and chore it used to be. Today almost everything is automated, and the most important choice for individuals and brands is picking the right platform, based on the goals they're trying to achieve.

    Written by Matt Kapko21 March 15 00:18
  • This isn't your father's enterprise software

    When Patrick Benson joined Ovation Brands back in September 2013, he was given a tall order: modernize an array of legacy IT systems that could no longer keep up with the restaurant-chain conglomerate's business processes.

    Written by Katherine Noyes14 March 15 01:23
  • After Wheeler unveils proposal, what's next for net neutrality?

    A flurry of activity will follow the plan from U.S. Federal Communications Commission Chairman Tom Wheeler to reclassify broadband as a regulated public utility as the foundation for new net neutrality rules.

    Written by Grant Gross06 Feb. 15 06:47
  • Social engineering stories from the front lines

    It's always amazing how little attention social engineering attacks get when discussing enterprise information security risks. After all, it's usually easier to get an unsuspecting employee to click on a link than it is to find an exploitable vulnerability on a reasonably hardened webserver. Social engineering attacks come from many different angles: from targeted e-mails, phone call pretexting, or acting like a service technician or other innocuous person to obtain access to the IT resources and data they seek.

    Written by George V. Hulme30 Jan. 15 06:42