Facebook & Google+
Follow me on TwitterMy Tweets
Chris Miller presented Social Identity: Public, Personal & Private at South by Southwest 2014. This session investigates how we expose our social identity, not content, and how to build personas to protect them.
In this recorded session I walk through the definition of social identity and how to split it into personas. I show where we have all made the worst mistakes along the way and how to get out of exposing our social identity.
With the amount of private identity data we share accidentally across the social sites and the amount of public data we use in our private site we open ourselves to security risks. With no tangible benefit in the sharing. Explore this topic with me in the session below.
See the video for the entire recorded presentation.
We were happy with 5Degrees and impressed with the team that we met while there. They put a lot of effort into the product and have been releasing updates regularly. As for Forecast, we have mixed feelings still as they continue to grow. I think we see more for the app that hasn’t been delivered yet and we hope shows up to have us use it more often.
Welcome to SxSW 2012 everyone. We are already deep into countless apps being launched and pitched. Paul and I are kicking off the mobile app reviews with Isis and Banjo.
Isis really isn’t launching, yet again this year we find out. Isis is a Near field communication technology providing your mobile device the ability to become a digital wallet. By being in close proximity to the payment terminal and entering your pin, you can quickly check out.
Other capabilities later would include sharing information and data between devices. They are working with Verizon, AT&T and T-Mobile right now to get this technology out there. We were a bit shocked to see such a nice display and demo area for them not even being a real product again this year.
Next up was another location based service called Banjo. This app for iOS and Android hooks into your social networks and alerts you (or not depending on your setting) if someone you know is close by. It will also see those publicly sharing their location. See our full review and concerns in the show.
I was recently bitten by an application I previously authorized against my Twitter account sending out some tweets I did not agree with. This prompted me to review my application security setting inside of Twitter. It opened my eyes into just how trusting we are, and shouldn’t be.
In the video I walk you through where to check what applications have access to your Twitter account and what access rights you have given.
With the launch yesterday of Google Plus pages for business, organizations and just about everyone else on the early adoptor bandwagon, I found even I wanted to make sure I took the right steps in the creation of pages. Keeping in mind they are only allowing one manager per page, I had a few questions/ I created a screencast walkthrough of the setup with explanations of settings. Check out the Spiked Studio page and add it to your circles!
Click through for the full HD version via the Spiked Studio page on YouTube!
There will be a part 2 for this explaining how to then hook your website of blog with the new Google Plus page.