Recently, I had the pleasure of presenting at SMX London on Supercharging your SEO with AI and thought I would share some of the insights with Search Engine Land readers. Google made global headlines with the demonstration of its new Duplex at this year’s I/O developers conference. This artificial intelligence (AI) system can “converse” in natural language with people to schedule an appointment at a hair salon or book a table at a restaurant, for example. To pass the Turing Test, AI must behave in a manner indistinguishable from that of a human. To many, Google Duplex has proven that it can pass this test, but in truth, we are only seeing the beginnings of its future potential. This particular use of AI made headlines because people are drawn to applications of AI that can mimic human interactions, whether in science fiction or in real life. While that response is driven by fascination, it is also host to an element of fear. Can AI replace people? As marketers, we typically encount..
Apple has updated the Legal section of its App Store rulebook to include new guidelines for members of the iOS Developer Program. iOS developers who collect or sell personal data to a third party without clear, express consent from their users will be banished from the Apple developer community, and the App Store implicitly. Apple’s new legal terms come on the heels of the EU’s General Data Protection Regulation that kicked into gear last month, affecting any global business that collects or processes personally identifiable information (PII) of EU citizens. The GDPR’s Data Minimization and Anonymization principles, as well as the so-called Right to Be Forgotten, oblige companies to limit the collection of personally identifiable information (PII) to the absolute minimum needed for the service or app to work properly. In that respect, Apple is now demanding that developers adhere to a new set of data collection guidelines. Some highlights: All apps must include a link to their priv..
The “Ask an #SMXpert” series continues the question-and-answer (Q&A) segment held during sessions at Search Marketing Expo (SMX) West 2018. Today’s Q&A is from the Advanced Audience Targeting & Management Tactics session with Jillian Nagle and Ben Wood and introduction from moderator Brad Geddes. Brad Geddes The rise of audience targeting is the biggest change in paid search over the last 10 years. You can easily create audiences based on a plethora of characteristics and then adjust bids, ads and content for each audience type. With so many options possible for creating audiences and customizing your marketing for each, it’s imperative in today’s competitive world that you have solid strategies in place to take advantage of these marketing capabilities. In this session, we looked at creative ways to create audiences, how to prevent your customers from going to the competition and ways of leveraging search and social together to ensure you are reaching your potential. Ben Wood too..
Adobe has released patches for all users running Flash Player 220.127.116.11 and earlier versions, addressing critical flaws in its trouble-plagued platform. Whether you are running the software on Windows, macOS, Linux or Chrome OS, the Flash Player creators urge you to install the newest version immediately! “Adobe is aware of a report that an exploit for CVE-2018-5002 exists in the wild, and is being used in limited, targeted attacks against Windows users. These attacks leverage Office documents with embedded malicious Flash Player content distributed via email,” the company says in its advisory. Affected installments of Flash include Adobe Flash Player Desktop Runtime, Adobe Flash Player for Google Chrome, and Adobe Flash Player for Microsoft Edge and Internet Explorer 11. Exploitation of the flaw can lead to arbitrary code execution, says Adobe. Users of Flash Player Desktop Runtime must install version 18.104.22.168 via the update mechanism within the product. The procedure applies ..
LJZ / Shutterstock.com Raise your hand if Facebook shared user data with you — because the list keeps growing. Days after learning the company had shared user information with at least 60 different device makers — including Apple, Samsung, Blackberry, Microsoft and Amazon — more names from that list have surfaced. The list includes Chinese device makers Lenovo, Oppo, TCL and Huawei. US intelligence officials flagged Huawei as a potential national security threat as far back as 2012, reports The New York Times. According to the report, the partnerships are still in effect, but Facebook says it will be “winding down” its relationship with Huawei by the end of this week. “Facebook officials said the agreements with the Chinese companies allowed them access similar to what was offered to BlackBerry, which could retrieve detailed information on both device users and all of their friends — including religious and political leanings, work and education history and relationship status,” sa..
The Australian government has drafted laws to gain access to encrypted messages from messaging apps, but tech companies fear this would create backdoors that would lead to encryption exploits and jeopardize security, writes The Guardian. The government sees these measures as a partnership with telecom and tech companies “to modernize” interception legislation and keep a closer eye on alleged criminals and terrorists. Officials say backdoors are out of the question, as other decryption methods will be used. As expected, Facebook and Google are key actors involved due to the massive amounts of personal data they collect from users. Australian Cyber Security Minister Angus Taylor gave no clear explanations of the technology and methods behind getting access to encrypted messages, or whether surveillance codes would be installed on mobile devices. Despite his reluctance to offer details, one thing is certain; the law will take effect in coming months and companies that don’t comply will ..