30 Ways To Leave Google Apps Behind:
“Start decoupling your identity from the underlying implementations today,” Eschenauer says. “This is the first step to free yourself from the corporate silos controlling your data and identity.” His own private email address previously forwarded to a Gmail address, but that made it easy to switch email implementations.
As much as I care about data privacy, I’m not so paranoid that I feel I need to disconnect from Google (or Facebook, or Apple…) but I do like to know my options. They’re bleak. Most people don’t have the means or the know-how to create a private cloud on a hosted server. Even using an email address on your own domain can create vulnerabilities, as Naoki Hiroshima discovered.
Senior managers are the worst information security offenders, according to Stroz-Friedberg (PDF).
Senior management—those who often have high levels of access to valuable company information—admitted to partaking in risky behaviors most readily.
This doesn’t surprise me. I’ve seen this many times, and have heard horror stories from friends who work in infosec. I am surprised that we haven’t heard that a senior-level executive was the initial point of access for a major breach. It’s only a matter of time.
Saddleback Leather noticed a lot of people knocking off their bags. Dave Munson thought maybe they could use a little help. His delivery is brilliant.
Ben Brooks, on the Google acquisition of Nest:
Handheld electronics requires more emotionally driven decisions. More “this feels wrong” and less “the data says this is wrong”.
Google has historically been an extremely data-driven company. This will be interesting to watch.
I keep hearing that word and I have avoided quoting The Princess Bride. Now this explains everything.
Seth Godin writes about how companies die gradually then suddenly:
Every day opportunities are missed, little bits of value are lost, customers become unentranced. We don’t notice so much, because hey, there’s a profit. Profit covers many sins. Of course, one day, once the foundation is rotted and the support is gone, so is the profit. Suddenly, apparently quite suddenly, it all falls apart.
Hat tip to Aaron Templer for the link.
What will Google learn by inserting itself into your energy stack?
…there are methods of inferring what devices are being used in a home at a given moment. It’s an aspect of “non-intrusive load monitoring”, whereby the energy signatures of individual devices like your washing machine or TV can be picked up as part of the overall energy input to the house.
Researchers in 2011 were even able to use a similar approach to determine what movie was being watched on a television set by making energy profiles of each film. This was achieved by observing that a television’s electricity load will vary over time depending on whether dark or light scenes are being displayed to the viewer.
Nest thermostat acquisition is Google’s home invasion.
I see a surprising number of marketing plans with “go viral” as a strategic pillar. This is magical thinking at its worst. Here are sage words from Upworthy, who are arguably the masters of viral content.
Unless you harness the magical powers of a unicorn horn, you will never know how to make all your stuff go totally viral.
Bonus tip: Your B2B content isn’t going to go viral. Read more in 10 Ways to Win the Internets.
This isn’t about editorial guidelines—it’s about security. Yahoo should treat this like any other security incident and explain what happened, what they’re doing to fix it, and what European consumers can do protect themselves. That would be one step that Yahoo can take to shift from complexity to clarity.