Humans are highly visual beings, so it s certainly no surprise that online video content is becoming a favorite source of information and entertainment across the digital landscape—and it shows no signs of slowing down.According to a HighQ infographic, experts believe that 69% of consumer Internet traffic will be from video by 2017—and that number will rise to 79% by 2018.In fact, the same infographic reports that 52% of marketing professionals worldwide name video as the type of content with the best ROI.As another example, TopRank Marketing has also taken to using video to add a visual dynamic to our weekly online marketing news roundup.Rather than just giving our readers a collection of industry articles and their links, Account Manager Tiffani Allen and Content Marketing Lead Josh Nite provide humor and insight on the trending topics.Best Practice: Consider using live streaming video to give your audience either a sneak peak at an upcoming event or make a special announcement.
If hackers take down a bank, it could endanger the whole society, says Barclays chairman John McFarlane.The financial sector needs to do more to protect itself against cybercriminals, as the combination of money and personal data that banks possess represents the "perfect target" for hackers, according to a new industry report.Read More"Digital technology has radically changed every aspect of our lives and brought untold benefits.Of course, with these opportunities it's introduced a new threat which is cybercrime; not only are they after our information, they're after our money and can and will steal it from wherever they choose," said John McFarlane, chairman of Barclays and TheCityUK.TheCityUK also calls for the creation of a City-wide cyber forum to "to promote collaboration across all firms" in the sector, in order to encourage best practice sharing and strengthen every organisation's cybersecurity.There is no silver-bullet to manage it, but there are practical steps the industry, and the customers we serve, can take to ensure we're well protected against attack," said Chris Cummings, chief executive of TheCityUK.
As you may or may not recall, given how much time has passed, hackers broke into LinkedIn s network back in 2012, stole some 6.5 million encrypted passwords, and posted them onto a Russian hacker forum.Because the passwords were stored as unsalted SHA-1 hashes, hundreds of thousands were quickly cracked.If you re not sure, a best practice would be to change it anyway, as well as on other critical sites where you may be using that same password such as your banking website, email, or Facebook, for example.LinkedIn says that it has increased its security measures in the years since the breach, by introducing stronger encryption, email challenges and two-factor authentication.They would also not necessarily protect users from hackers who had obtained email and password combinations.We are taking immediate steps to invalidate the passwords of the accounts impacted, and we will contact those members to reset their passwords.
A Rakuten delivery drone to be used on a Japanese golf course is seen in a promotional video from the company.Drone operators should also not use personal data without consent for employment eligibility, promotion, or retention; credit eligibility; or health care treatment eligibility other than when expressly permitted by and subject to the requirements of a sector-specific regulatory framework.NTIA warns that the best practices proposed should not be construed to limit or diminish freedoms guaranteed under the U.S. Constitution, or replace or take precedence over any local, state, or federal law or regulation.It announced draft rules in February last year which placed, among other things, limits on the size and height to which drones can fly, and also included curbs on their flights at nights and away from the visual line-of-sight of operators.The best practices can help promote Department of Commerce priorities by allowing the drone industry "to grow, develop and innovate while helping to build consumer trust," said Secretary of Commerce, Penny Pritzker, in a statement.Drone and industry groups have welcomed the new recommendations.
If Backblaze s 61,523 operational hard drives are any indication, not often.On average, Backblaze reports its drives have a fail rate of 1.84 percent in Q1 2016.Its most used drive was a 4TB Seagate, while the 2 and 3TB HGST have a slightly better lifespan.HGST was far and away the best drive on Backblaze s test; it routinely hovers around one percent failure rate.Backblaze obviously isn t the only horse in the race when considering servers, but it s a good look at best practices for those interested in building their own server.If your app or service depend on it, looks like HGST may be the way to go.
If hackers get your LinkedIn password, they could use it to try to access your email as well.A 2012 LinkedIn hack was much bigger than previously expected, with well over 100 million people potentially at risk, the professional networking site announced earlier this week.If you ve been a member of the site for that long, it s possible that your personal details and password were leaked online by hackers.While the passwords were encrypted — an additional layer of security that essentially masks the characters — hackers have cracked most of them, Motherboard s Lorenzo Franceschi-Bicchierai reported on Wednesday.If it works, all of your messages are now exposed, potentially including banking information or allowing access to other sites.The best practice is to use a unique password on every service — to avoid this exact situation should hacks occur.
Safety regulations for drone usage continue to be formulated, with the US Federal Aviation Administration last month proposing a four-tiered classification system with different rules for how drones can and can t interact with crowds.In February last year U.S. president Barak Obama asked the National Telecommunications and Information Administration NTIA , which advises on telecoms policy issues, to bring various stakeholders together to help develop best practices to address privacy, transparency and accountability issues relating to private and commercial use of UAS aka drones .Voluntary best practice for drone operatorsAmong the recommendations suggested, drone operators are urged with some caveats to provide prior notice to individuals of the general timeframe and area that they may anticipate a UAS intentionally collecting covered data — where covered data means data that can identify a particular person.This policy is suggested to include:the purposes for which UAS will collect covered data;the kinds of covered data UAS will collect;information regarding any data retention and de-identification practices;examples of the types of any entities with whom covered data will be shared;information on how to submit privacy and security complaints or concerns;information describing practices in responding to law enforcement requests.without express consent from the data subject :employment eligibility, promotion, or retention;credit eligibility;healthcare treatment eligibilitySo your boss should not really be deploying a drone over your house to check if you are sunbathing in your garden that time you called in sick.However no limits are placed on the use/sharing of aggregated covered data as an input e.g., statistical information for broader marketing campaigns .
Another method is agile unified process AUP designed by Canadian software engineer Scott Ambler.Its working environment is based around repeating a series of learning methodologies and cycles of repetition, collaboration and learning cycles.XP improves a software project in five different ways: communication, simplicity, feedback, respect, and courage.These include the planning process, small releases of the software, common metaphors, simple design, testing, refactoring, pair programming, collective ownership of every line of code, continuous integration, constant customer relationship, and the respect of a coding standard which stipulates that all coders have to write in the same way.Elsewhere, another agile software development method is dynamic systems development DSDM .DSDM is vendor-independent, covers the entire lifecycle of a project and provides best practice guidance for on-time, in-budget delivery of projects, with proven scalability to address projects of all sizes and for any business sector.
Unless you're a media companyYou can't use drones to check whether your employee really is sick, or to take pictures of your neighbors, unless you're a news organization in which case the sky is the limit - or more accurately not the limit.As the name suggests, the guidelines are not obligatory or legally binding but will form the start of a broader US government effort to come to terms with drone technology and how it will impact citizens and businesses in the future.In many respects, the guidelines are the antithesis of recent rules published by the Federal Aviation Authority FAA : where the FAA's rules are precise, the NTIA guidelines are vague; where the FAA threatens fines, the NTIA advises caution; and where the FAA is often hopelessly unrealistic, the NTIA's guidelines are grounded in reality.It also recommends that some potential uses be banned altogether, including anything relating to: employment eligibility, promotion, or retention; credit eligibility; and healthcare treatment eligibility.It also advises people not to fly over private property, not to gather personal information, to give people a reasonable level of privacy, and to delete data on people if they ask.Instead they should "operate under the ethics rules and standards of their organization, and according to existing federal and state laws."
Uni security manager offers his best half-dozen breach responsesAusCERT Audio Security and forensics man Ashley Deuble has outlined the six stages of good incident response that if followed could bring an enterprise in line with Fortune 50 best practice.The Griffith University security manager says the steps of preparation; identification; containment; eradication; recovery, and lessons learned are core to help organisations successfully recover from data breaches."The state of incident response IR is not good," Deuble told the AusCERT security conference on the Gold Coast yesterday."But it's not all about IR - it's about detection, understanding what security means, and having budget, so you're local fish and chips shop is not going to have this."Griffiths University security manager Ashley Deuble.Throughout the incident response process, documentation is king; Deuble says security types should "document everything", answering questions of who, what, when, and how.
Earlier this month, The Data Pack released a list of strange and hilarious hashtags that have been censored by the site.When attempting to browse certain hashtags, users are shown a select few images, along with the following message: Recent posts from lesbian are currently hidden because the community has reported some content that may not meet Instagram s community guidelines.A spokesperson for Stonewall, the UK s LGBT charity, told HuffPost UK: Many young lesbian, gay, bi and trans people in particular use online spaces as forums and a chance to create communities.Elly Barnes, CEO and founder of Educate & Celebrate, an organisation dedicated to implementing an LGBT Inclusive curriculum, told HuffPost UK: Ostensibly by saying that one hashtag is allowed while another of the same kind isn t, it starts to create a hierarchy within marginalised groups which does no good for anybody.It s particularly significant in this case because of the significance of words, Barnes said.Educate & Celebrate have issued a Best Practice Programme that teaches that words such as gay, lesbian, bisexual and trans aren t to be feared,but should be used contextually and with respect .
New research into B2B marketers with account-based marketing ABM in place has revealed more than three-quarters are developing resources to further continued usability and best practice sharing in order to scale their programmes and expand their efficiency.The Information Technology Services Marketing Association ITSMA released results from a March 2016 survey, which polled B2B marketers globally on what approaches they re using to scale their account-based marketing programmes.Of those surveyed, 77 per cent said they were developing tools and templates to encourage repeat use and best practice sharing.More interestingly, 69 per cent said they were adding technology to automate and create more leverage.While marketing technology is top of mind for all marketers, B2B marketers evidently lack some of the resources they need, but are trying to make the best of them.According to a separate survey released in August 2015 by Ascend2, more than two-thirds of B2B marketing professionals worldwide said they didn t have the marketing technology tools they needed.
Have you ever heard the expression If I had a dollar for every time ... ?Here s a story that illustrates this point.The Disappointed JournalistI recently had a conversation with a reporter from a major media outlet who was lamenting the lack of usable sources for stories.I often get referred to an expert who I think would be a good interviewee for a piece I m writing, she told me.There are hundreds of large and small decisions that impact how well a website reflects a business s brand and marketing orientation.One infographic from Kissmetrics highlighted various research on the impact of color and design on online branding and buying, including the following points:Color increases brand recognition by 80 percent.
Mark Zuckerberg HackedIf there s one person you d think would use good security to protect social media accounts, Facebook CEO Mark Zuckerberg would be a good bet.But apparently, nothing is sacred: Zuckerberg s Twitter, Pinterest and possibly Instagram accounts have all been hacked.That would make a lot of sense, because a Zuckerberg hasn t used his Twitter or Pinterest accounts in years, and b a bunch of other celebrities have also seen their Twitter accounts hacked in the last few days.I guess things work a little more easily when you re the CEO of the world s largest social network, but it s still a good cautionary tale for the rest of us, who will find it a little harder to regain control if or when we get hacked.Best practice is to use unique passwords on every site, but as this hack proves, even the best of us can t be bothered.Thanks to the sharing economy, living in five different cities in five years has never been more doable.
The Duke of Cambridge is to lead tech giants Snapchat, Facebook and Google in an effort to combat cyberbullying among children and young people.The Duke has asked the Taskforce on the Prevention of Cyberbullying to consider how to make it easier for children and parents to get help if they experience bullying online.The Duke of Cambridge is due to speak in more detail about the issue of cyberbullying later this weekA spokesperson for The Duke said: The Duke is pleased that so many leaders and experts in technology and communications have agreed to join his Cyberbullying Taskforce.He hopes the Taskforce can help share the best practice that is emerging and put in place new standards so that the Internet remains something young people and their parents can embrace with confidence.Snapchat has grown in popularity among teenagersThe taskforce will also be supported by a panel of young people aged 11-15, to ensure it remains engaged in current online trends.Tech entrepreneur Brent Hoberman, C.B.E., who founded lastminute.com, will chair the Taskforce.
A monster post by Juan Martitegui, PPC mastermind and guy who created MindValley Hispano.Juan goes over some obvious and very non-obvious ways to reduce wastage in paid acquisition campaigns.While "reducing waste" may not seem as sexy as "acquiring milllllllions of users," in fact it's a necessary best-practice that can save cash-strapped startups tens of thousands of dollars in marketing money.Actually, who doesn't want to spend less on acquisition?Anyway, a very tactical guide with about a dozen specific to-dos that you can implement right now.
In cities looking to end Craigslist deals gone wrong, that's exactly what safe trade zones are for.A big part of people's lingering uneasiness toward the site is tied to these kinds of worst-case scenarios: off-the-books deals happening on private property, with few to no security measures in place.Buyers will feel more comfortable, the thinking goes, if they know help is just several yards away."I'll gladly give up two of my parking spaces to create an atmosphere that we're at a location that's safe," Carl Pardiny, chief of Fairfax County Police in Fairfax, Virginia, told the Washington Post.For towns without safe trade zones in place, best practice dictates that buyers meet up near law enforcement anyway.More from Tech Insider:Apple is changing the way you unlock your iPhone in iOS 10 AAPL HBO just released 8 new photos teasing an epic battle on Sunday's 'Game of Thrones'Cars have never looked this good in any video gameSolarCity s CEO told us he's confident we will see the end of fossil fuels in our lifetimeThis tiny bag claims to clean your clothes as well as a washing machine in 3 minutesNOW WATCH: Police staged a scarily realistic terror drill at one of the UK's largest shopping centresLoading video...
"This means that by the end of 2016, when your apps communicate with server backends, they must do so using a secure TLS back-channel unless the data is bulk data such as media streaming, or data that is already encrypted," said Krstić.Cupertino says that many developers are already using the security tools.Designed to prevent attackers from intercepting data traffic, ATS ensures that all HTTP connections made by an app use the secure TLS 1.2 protocol to encrypt data while in transit.Krstić listed ATS as a "best practice" for developers alongside other measures, such as Touch ID authentication and maintaining updated API code that third-party developers should use.The Apple security engineer credits his company's security approach as the reason iOS malware is all but unheard of in comparison to nefarious software found on competing Android devices.Those protections have also brought Apple criticism from government and law enforcement agencies, most notably earlier this year when Cupertino engaged in a standoff with the FBI over its refusal to help investigators crack the iPhone used by one of the San Bernardino shooters.
In this edited excerpt, Leland explains how you can determine exactly what your unique branding proposition is so you can use it to attract business.I honestly think that if you re great at what you do or make, or build, or offer , there s enough work to go around.A good fit in terms of personality, style, and ways of workingKeep in mind that depending on your client s objectives, the attributes they re looking for won t be of equal importance.Next, label column three Zone, review each attribute, and assign it a zone according to the following scale:Not Zone.Label column four Competition, and rate your competitors as a whole or by specific name on a scale of 1 to 10 for how well their current brand matches each desired attribute.It can be something as simple as depth or breadth of experience.
Hi Guys,I work for a marketing agency and typically we've done a lot of content marketing, blog writing and paid advertising on FB for instance and we also manage a lot of print media for our clients.Recently the boss has decided that he wants to move into doing more SEO work which I am apprehensive about.I have three questions really for anyone who has any experience in thisIs SEO really something worth getting into or is it just snake oilWhat is best practice?Should I be paying for something like Moz or Hubspot?
More

Top