Share this post with Digg

Technorati’s State of The Blogosphere 2008 Is Out

By Daniel Scocco

Almost one year passed since the last State of the Blogosphere report, but the new one is finally here. Not only that, but apparently this one is bigger and more comprehensive. So big they are breaking it down in 5 parts, one released each day of this week.

state of blogosphere 2008

The first part of the report is titled “Who Are the Bloggers?”……………..


The Google Phone: G1 is born today

By Jemima Kiss

So here it is: Google’s long-awaited mobile phone. Rumours started solidifying about 18 months ago… and today the G1 phone on the T-Mobile was formally announced.

Android

By rushkoff

I played with Android yesterday. I don’t gush over products. At least not in years. But this one makes me feel a bit like I did when I got my Kaypro. It’s a solid device that hints at the beginning of a "golden age" of solid and reliable smart phone technology.

For those of you as uninformed as I’ve been lately, Android is Google’s new cell phone operating system, coming to you any day now on a phone made by HTC – the folks who have been making the Treo (but without their own name on the case).

The first Android-powered phone

By A Googler

Today, T-Mobile announced the world’s first Android-powered phone. This marks an important milestone in the young history of Android. It was less than a year ago, on November 5, that the Open Handset Alliance, a group of more than 30 technology and mobile companies, announced plans to create a complete mobile platform that would facilitate the development of advanced mobile applications and give users the best the web has to offer on a mobile device.

Spore, digital rights, and the future of gaming, Evgeny Morozov

Spore – "the most hotly anticipatedcomputer game of the year" according to CNN – has quickly become the mostcontroversial game of the year and, quite likely, of the whole decade. Freshlyreleased by Electronic Arts (EA) and designed by Will Wright, the designer of Sims, the best-selling brand in the history of gaming, Spore relies on a vastarray of themes from evolution to genetics, a sure way to win the hearts andminds of nerdy gamers.

State of the Blogosphere 2008

By Richard Jalichandra

I’m very happy to announce that we released the 2008 State of the Blogosphere report this morning. If you missed my talk at Blog World Expo on Saturday, you can see the study here.

We’ve been publishing this report since Dave Sifry wrote the first one in 2004.
This year, we wanted to go beyond the numbers and deliver deeper insights into bloggers and the state of blogging today. In addition to analyzing the data from the Technorati Index, for the first time, we’ve reached out to the blogosphere to understand the role of blogging in their lives; tools, time and resources used for their blogs; and how blogging has impacted them personally, professionally and financially.

Detect Narcissists on Facebook

By Nick O’Neill on News

According to a new University of Georgia study, Facebook profiles can be used to detect narcissism. How do you determine narcissism exactly from looking at a Facebook profile? Well “the number of Facebook friends and wallposts that individuals have on their profile pages correlates with narcissism.” The article continued that “Narcissists are also more likely to choose glamorous, self-promoting pictures for their main profile photos, while others are more likely to use snapshots.”

Blog History 101::Scott Rosenberg Traces the Blogosphere’s Origins

The Android Phone T-Mobile G1

By Philipp Lenssen on Search

T-Mobile’s G1 phone was officially announced today. It’s going to be the first mobile phone based on Android, the Google-and-partners powered (and supposedly soon to be open source released) mobile operating system. T-Mobile says the phone has a touch screen, a keyboard, and includes different Google apps, like Google Maps or Gmail, with data synchronization features to Google’s tools. The HTC-built G1 comes with a 3-megapixel camera and is wi-fi enabled. It’s also connected to Amazon’s DRM-free MP3 music store, and an Android applications directory. The back of the phone has the Google logo on it.

EU scrutinises Yahoo-Google deal

The European Competition Commission joins its US counterparts in ensuring the deal is within antitrust laws.

Browser Wars II Google has taken the logic of loss-making technology to its ultimate culmination of not charging for its product at all.

New Media vs. New Censorship: The Authoritarian Assault on Information
Source: Broadcasting Board of Governors
From press release:

The increasing sophistication of web censorship by authoritarian governments creates significant challenges to unleashing the Internet’s potential for information freedom, according to panelists speaking at a Broadcasting Board of Governors (BBG) workshop on Sept. 10, 2008.

Web 3.0: Object Orienting The Web

By Hank Williams on Web 3.0

A big part of what I do professionally is focused on thinking about how to improve the usefulness of the web. Tied into that is the additional question of how to empower developers to create more useful applications.

Much of this exploration has lead me to believe that the most powerful “pregnant” web concept is the simple idea that the web should be a web of objects, and should become less a web of text or pages. Indeed the web h

as been moving in that direction, but the road map has not been entirely clear.

Top Search Engine Marketing Tools

By Aaron Wall

Aaron Wall is a search engine optimization consultant at Clientside SEM and the author of the SEO Book blog. Aaron lives in Oakland, California. This time he takes a look at the top SEO tools.

The future of online video

By Karen

The Internet has had an enormous impact on people’s lives around the world in the ten years since Google’s founding. It has changed politics, entertainment, culture, business, health care, the environment and just about every other topic you can think of. Which got us to thinking, what’s going to happen in the next ten years? How will this phenomenal technology evolve, how will we adapt, and (more importantly) how will it adapt to us? We asked ten of our top experts this very question, and during September (our 10th anniversary month) we are presenting their responses. As computer scientist Alan Kay has famously observed, the best way to predict the future is to invent it, so we will be doing our best to make good on our experts’ words every day. – Karen Wickre and Alan Eagle, series editors

YouTube Activism::How Greenwald’s Brave New Films Spreads Its Political Message Online

brave%20new%202.jpg

Last month, Politico’s Mike Allen asked presidential hopeful John McCain the seemingly innocent question of how many houses he owned. McCain’s response — “I’ll have my staff get to you” — became a major focus for both the media and Obama’s campaign, who repeated it in just about every speech to illustrate that the Republican candidate was “out of touch” with the millions of Americans affected by the housing crisis.

Campaign: Sex Education from a Mobile Ringtone

A ringtone that repeats the word “condom” sung in different melodies to spread the word of safe sex in India. According to Yvonne MacPherson, this is the “first time a mobile ring-tone had been used to communicate a social or public health message.” So far, the ringtone has been downloaded over 270,000 times and is helping to spark conversations about safe sex and to break condoms out of being a taboo subject (no pun intended).

Digital Tools Being Used: mobile cell phones

Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches

The 9/11 terrorists, before their deadly attacks, sought invisibility through integration into the society they hoped to destroy. In a similar fashion, the terrorists who carried out subsequent attacks in Madrid and London attempted to blend into their host lands. This strategy has forced governments, including the United States, to rethink counter-terrorism strategies and tools.One of the current favored strategies involves data mining. In its pattern-based variant, data mining searches select individuals for scrutiny by analyzing large data sets for suspicious data linkages and pat-terns. Because terrorists do not "stand out," intelligence and law enforcement agents want to do more than rely exclusively on investigations of known suspects.

Tagged in:

%d bloggers like this: