Mar 062013
 

Recently, we reported that videos uploaded via Facebook have a higher Engagement Rate than YouTube links. You asked us how these two methods of uploading videos affect their reach – here are the results!

For the purpose of this study, we have chosen videos that brands have shared across Facebook during the last three months. As you know, there are two options – to either upload the video natively from your computer or to share a link to your video from YouTube. Apparently, admins prefer the latter, with 4 731 YouTube links posted vs. 554 Facebook videos, from December 4th – March 3rd 2013.

Facebook videos tend to have a higher Engagement Rate than YouTube links (0.22% on average compared to 0.10%). As already mentioned in the previous study, this could be due to the fact that you can play Facebook videos directly from the mobile news feed, which is increasingly becoming a preferred way of social update consumption. Interestingly enough, both YouTube links and Facebook videos generate nearly the same fan interaction, with about 77% of Likes, 16% of Shares, and 7% of Comments.

READ MORE:  Facebook Videos Have a 10x Higher Viral Reach than YouTube Links 

 

 


 

Mar 062013
 

These two multi-channel retailers found that mobile store locators get feet in stores and dollars in the cash register.

RadioShack launched its mobile site in 2011, streamlining it to make it easier for shoppers to quickly find products and services. It includes a mobile, touch-optimized store locator with click-to-call and GPS functionality. After its launch, the retailer found the average order value increased by 30 percent.

An analysis of four months’ worth of data completed by RadioShack with Mindshare, its agency, found that 36 percent of clicks were on its store locator page. Based on internal data, they estimated that 40 to 60 percent of clicks on its store locator resulted in visits to a physical store. Of those who did shop at a store, 85 percent made a purchase.

Before this study, RadioShack had only tracked conversion on its mobile site; it didn’t have great visibility into how mobile search affected in-store sales. “It wasn’t a good way to capture the whole conversion process and how users are interacting. The study was trying to follow the customer through the whole experience,” says Lisa Little, RadioShack search marketing manager.

READ MORE:  RadioShack and Adidas Find Store Locators Ring Up Sales | ClickZ.

 

 


 

Mar 052013
 

evernote

Security experts are criticizing online note-syncing service Evernote, saying the service needlessly put sensitive user data at risk because it employed substandard cryptographic protections when storing passwords on servers and Android handsets.

The scrutiny of Evernote’s security comes two days after Evernote officials disclosed a breach that exposed names, e-mail addresses, and password data for the service’s 50 million end users. Evernote blog posts published over the past few years show that the company protects passwords and sensitive user data with encryption algorithms and schemes that contain known weaknesses. That is prompting criticism that the company’s security team isn’t doing enough to protect its customers in the event that hackers are able to successfully compromise the servers or end-user phones.

The chief complaint involves Evernote’s use of the MD5 cryptographic algorithm to convert user passwords into one-way hashes before storing them in a database. Use of MD5 to store passwords has long been frowned on by security experts because the algorithm is an extremely fast and computationally inexpensive way to convert plaintext such as “password” into a unique string of characters such as “5f4dcc3b5aa765d61d8327deb882cf99.” MD5 makes an attacker’s job of cracking the hashes much easier by allowing billions of guesses per second, even on computers of relatively modest means.

By comparison, the use of slow algorithms such as bcrypt, which Twitter uses to protect its passwords, adds considerable time and computing requirements to the task of converting the hashes into the underlying plaintext passwords. Even when hashes are generated using cryptographic salt to add randomness—as Evernote says it does—MD5 is still considered a poor choice.

READ MORE:  Critics: Substandard crypto needlessly puts Evernote accounts at risk | Ars Technica.

 

 


 

Mar 052013
 

random-numbers

Some say we’re living in a “post-PC” world, but malware on PCs is still a major problem for home computer users and businesses.

The examples are everywhere: In November, we reported that malware was used to steal information about one of Japan’s newest rockets and upload it to computers controlled by hackers. Critical systems at two US power plants were recently found infected with malware spread by USB drives. Malware known as “Dexter” stole credit card data from point-of-sale terminals at businesses. And espionage-motivated computer threats are getting more sophisticated and versatile all the time.

In this second installment in the Ars Guide to Online Security, we’ll cover the basics for those who may not be familiar with the different types of malware that can affect computers. Malware comes in a variety of types, including viruses, worms, and Trojans.

Viruses are programs that can replicate themselves in order to spread from computer to computer, while targeting each PC by deleting data or stealing information. They can also change the computer’s behavior in some way.

“Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program,” Cisco notes. “When the host code is executed, the viral code is executed as well. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.”

READ MORE:  Viruses, Trojans, and worms, oh my: The basics on malware | Ars Technica.

 

 


 

Mar 052013
 

tweetdeck

Twitter will shut down multiple TweetDeck apps to focus on the product’s web-based version, the microblogging service announced Monday.

In yet another sign of the battle between social media’s two biggest players, Facebook integration will be removed, too.

The announcement was met largely with a chorus of “nooooooooo,” “whyyyyyyy” and “gaaaaaaaah” on social media, reflecting TweetDeck’s widespread popularity with hardcore Twitter users.

TweetDeck AIR, TweetDeck for iPhone and TweetDeck for Android will be removed from their respective app stores in May, and stop working soon after, according to a TweetDeck blog post.

“To continue to offer a great product that addresses your unique needs, we’re going to focus our development efforts on our modern, web-based versions of TweetDeck,” the post says.

READ MORE:  Twitter Killing TweetDeck for iPhone and Android.

 

 


 

Mar 052013
 

facebook

Facebook today confirmed dwindling engagement with public posts to subscribers cited by The New York Times’ Nick Bilton, other journalists, and I, but calls us isolated cases, noting public figures with more than 10,000 fans are now getting 34 percent more Likes and comments than a year ago. While Facebook often changes the news feed to improve the user experience, the inconsistency is irksome.

So here’s the story. Yesterday, Nick Bilton of the New York Times wrote that when using Facebook’s Twitter-esque Subscribe feature to post public updates to his subscribers, he’s getting a lot fewer Likes and comments than a year ago. He suggested this is because Facebook is showing more ads instead.

Other journalists including me cited similar experiences, where our Facebook follower counts had grown significantly, but we were getting equal or less engagement now than in the months after Subscribe launched. I suggested that along with the presence of ads, people sharing more posts that compete for news feed space and Facebook’s tendency to give more feed presence to new products may have been responsible for the drought.

In a bit of damage control, Facebook sent out the following statement, hoping to frame these cases as flukes. Here’s the full-text, with my comments in brackets.

READ MORE:  Facebook Admits Likes Are Down For Some Celebrities’ Posts, But Claims Up 34% For Most | TechCrunch.

 

 


 

Mar 052013
 

calendar

IMN recently surveyed marketing professionals across different industries to get a clear picture of how they viewed content marketing programs, and subsequently, measured its effectiveness. While the vast majority of respondents understand the value of a content marketing program, have a solid grasp on what the goals of the program should be, and are engaged in content marketing efforts, many are having serious challenges in executing a content marketing program at a very basic level. Internal resource constraints, finding and sourcing relevant content, making sure content passes regulatory compliance, and hiring good content writers were the primary challenges respondents faced when implementing a content marketing strategy.

Content marketing program drivers

Customer and prospect engagement and awareness are two of the top goals for content marketing programs. Combined, these two responses represented the top goal of 51 percent of survey respondents. Customer loyalty, increased leads, increased revenue, and thought leadership are also program drivers. While 82 percent of respondents were either directly or indirectly involved in their content marketing strategy, 29 percent did not feel they had a solid understanding of what content marketing could accomplish in terms of customer engagement.

To achieve any of these program goals, organizations need to map the type of content to the goal. For example, if customer and prospect engagement is a top goal, thinking about the top five questions a prospect might ask and mapping the content to those areas would be a sound strategy.

READ MORE: How to create a stellar content marketing program – iMediaConnection.com.

 

 


 

Mar 052013
 

opera-beta

The first results of Operas WebKit brain transplant are now available for people to try: a beta version of Opera for Android.The new version uses Android-native user-interface elements but preserves many Opera features such as Speed Dial. It gets some new features, too, such as Off-road Mode to enable a proxy-browsing technology designed for slow network connections and the Discovery tool for people who want to browse content tailored to their interests.

READ MORE:  Operas overhauled Android browser now in beta | Internet & Media – CNET News.

 

 


 

Mar 042013
 

Facebook-like-button

This presentation on “6 Social Media Tips for Traditional Media” was presented by Erica Swallow on Friday, June 25, 2010 at Social Media Brasil (http://www.socialmediabrasil.com.br/), the largest social media conference in Brazil.

The presentation cover six tips that online publishers should consider when implementing a new social media strategy or improving upon an existing strategy.

 

 

 

via Six Social Media Tips for Traditional Media.

 

 


 

Mar 042013
 

google+

Launched by Google in 2011, Google+ is the latest social networking tool on the block. Businesses of all types, but especially those in the consumer goods market, are giving the platform a try. In this presentation, attendees will discover the pros and cons of using Google+ from a business point of view, while also learning about how other brands are using the platform.

 

 

via How Brands are Using Google+.