Special Report: The Complete Guide to Twitter Analytics

Posted by John Onwuegbu | Wednesday, July 23, 2014 |

Twitter is a green field for content marketers and social media managers alike, with more than 241 million active users, 58 million Tweets, and 2.1 billion searches every day, online marketers have an active and informed audience to engage.

Now, what's the best way to engage followers? How often do I need to tweet or reply to stay relevant? What's the best way to leverage my brand's Twitter account?

The answers lies in a few key metrics that you should be using to gauge your performance, all accessible through the Simply Measured Twitter Account Report. The different Twitter metrics are measurable through the Simply Measured Engagement Megaphone, and there are several specific ways to use them to create actionable Twitter tactics.

Learn about the tools to do the analysis and reporting yourself in this definitive report on "The Complete Guide to Twitter Analytics" by downloading free now.

Read More>>

Browser Wars: Desktop Browser Usage Trend for First Quarter 2014

Posted by John Onwuegbu | Monday, July 21, 2014 |

The Browser market share is always changing, and there are plenty of sources for global browser stats, however, the most divergent methods are user-based or hit-based. Simple illustration, if you have a small website and 5 different users visit one day all with different browsers. Each has a 20% share. But if 4 of them just look at one page, and the 5th user looks at 10 pages, then the user-based stats are still the same at 20%, but the hit-based stats have changed radically in favor of that guy looking at 10 pages.

Whilst, Internet Explorer 10 directly trails the path of IE9, these improved IE versions are taking the top slots with IE11 solidly in first, at least in many regional stats.

The most reputable and commonly cited source, NetMarketShare has the following results (February 2014):


  1. Internet Explorer: 58.19%
  2. Mozilla Firefox: 17.68%
  3. Google Chrome: 16.84%
  4. Safari: 5.67%
  5. Opera: 1.23%
Ironically, the NetMarketShare stats has IE8 as the number one IE version at 22%, which is supported by the fact that some regions like China, with qazillions of users, have many users still stuck on very old Microsoft operating systems with older versions of Internet Explorer.

Read More>>

Content marketing is the linchpin of demand creation – the link between brand awareness and lead generation. It involves the creation and sharing of media and publishing content in order to acquire customers. If done well, it builds familiarity, affinity and trust with prospective and current customers by providing information that resonates – in the right format, through the right channel, at the right time.

But a content marketing strategy doesn’t create itself. It’s the result of clear intention, careful planning, and focused execution.

These six best practices can help you develop and deploy effective strategies for content marketing across all channels and buying cycles. By leveraging these best practices, you can create an effective content marketing strategy or fine-tune the one you already have in place.

Now, the ball is in your court, download the free white paper on the "6 Best Practices for Creating a Content Marketing Strategy" for effective content marketing campaigns.

Read More>>

Why is Java no longer supported on Windows XP?

Posted by John Onwuegbu | Monday, July 14, 2014 |

Microsoft's support for Windows XP ended on April 8, leaving out the aged OS access to future security updates. And Oracle announced that it too will stop providing official support for Windows XP, with rumors claiming that the upcoming security update for Java 7 and future releases might not work on Windows XP.

The company has dispelled the rumors that the upcoming security update for Java 7 and those it will release in the future might not work on Windows XP.

Oracle maintains that all versions of Java that were supported prior to the Microsoft de-support announcement will continue to work on Windows XP according to a blog post. Even as the next security updates for Java 7 is scheduled for Tuesday and will fix 20 security issues which could be exploited remotely without authentication, Windows XP users may still continue to use Java 7 updates at their own risk, but support will only be provided against Microsoft Windows releases Windows Vista or later.

The point remains that Oracle can no longer provide complete guarantees for Java on Windows XP, since the OS is no longer updated by Microsoft.

The company, however have strongly recommend that users upgrade to a newer version of Windows that is still supported by Microsoft in order to maintain a stable and secure environment.

Read More>>

The Collaborative Economy, for those new to the term, is a powerful movement in which people are getting things from each other, it's a combination of trends like the sharing economy, maker movement, and co-innovation. What this means is that people go to a site like LendingClub to get funding for their new project, rather than a traditional bank. Or, they may go to a site like Etsy or Shapeways to get custom made goods, or go to a site like eBay to buy pre-owned goods, instead of buying new products from retailers. In each of these cases, the crowd is self-empowered to get what they need from each other.

But while the Collaborative Economy is poised to disrupt many industries, there is remarkably little data on how many people participate in sharing and making, who they are, and, most importantly, why they do it.

This report offers critical insight for big brands who are grappling with the emergence of the Collaborative Economy, and for the startups that are driving this growth. It aims to paint a picture of the sharers in the Collaborative Economy and provides important recommendations for businesses that want to win in this new economy.

And perhaps, this is the Largest Study of the Collaborative Economy engaging 90,112 people in the US, Canada and the UK. Download the free white paper on "Sharing is the New Buying, Winning in the Collaborative Economy" now.

Read More>>

Microsoft announced a milestone in its effort to strengthen encryption across its networks and services by the introduction of Transport Layer Security encryption (TLS) for its webmail services, including Outlook.com, Live.com, and MSN homepage. What this means for users is that when you send email, its encrypted and thus better protected as it travels between Microsoft and other email providers. However, this requires that the other email service provider also have TLS support.

In addition to the availability of TLS, Outlook.com has also enabled Perfect Forward Secrecy (PFS) encryption support for sending and receiving mail between email providers, making it more difficult for attackers to decrypt connections.

Matt Thomlinson, VP, Microsoft Trustworthy Computing Security, announced in a blog post on the company's comprehensive engineering effort to strengthen encryption across its networks and services with the goal to provide even greater protection for data across all Microsoft services.

Also, Microsoft Cloud computing service, OneDrive now has PFS encryption support enabled as well. OneDrive customers now automatically get forward secrecy when accessing OneDrive online (https://onedrive.live.com), or via the OneDrive mobile application and sync clients.

As with Outlook.com’s email transfer, this makes it more difficult for attackers to decrypt connections between their systems and OneDrive.

Read More>>

Special Report: 2014 Cyberthreat Defense Report

Posted by John Onwuegbu | Monday, June 30, 2014 |

Cyber-attack, according to Wikipedia is an offensive maneuver employed by individuals or organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.

And as applicable to war scenario, knowing your enemy is also the key to an effective strategy for IT security.

Trusted experts in cyber-security, CyberEdge has provided the "2014 Cyberthreat Defense Report" to illustrate the current security landscape and make near-future projections. In addition to attack statistics from North America and Europe, you'll learn where most IT professionals see weaknesses in their environment and how they plan to strengthen those areas.

Top on the list of things you'll learn includes: Barriers to establishing effective defenses, Common host security misconfiguration, and How BYOD is changing cyber-security. Don't let cyber-attacks get the best of you or your organization by Downloading the "2014 Cyberthreat Defense Report" today.

Read More>>