Skip to content

Amazon’s revenue from advertising has skyrocketed because endemic advertisers (brands that sell products on Amazon and buy ads on Amazon) have grown their Amazon ad budgets significantly over the past two years, and nonendemic advertisers (brands that don’t sell products on Amazon but buy ads using Amazon’s ad stack) are finding value in using Amazon’s rich behavioral and purchase-level data for more granular ad targeting.
-- Forrester's, Forbes

In an interview with CNBC, Fried said the company hadn’t previously advertised on Google but started doing so since Basecamp would sometimes show up fifth in search results under advertisements, "even though we’re the first organic result and it’s our brand." For instance, when searching for Basecamp on Google, a user might see an ad for Monday.com positioning itself as a Basecamp alternative.
-- Megan Graham, CNBC

I do not typically use Google for search, but here is a search on "basecamp" in Duck Duck Go:

Search for basecamp in Duck Duck GoI am not sure why media companies allow targeting a competitor's trademark (aka "conquesting") with ads. Not to mention it is just bad form, for the companies that are doing it. I did just search "basecamp" on Google, and it looks like Monday.com or Google pulled the ad.

BTW, compare the search results and you will see why Duck Duck Go is the awesome.

-- Scrib

For years, Apple and Google have allowed companies to bury surveillance features inside the apps offered in their app stores. And both companies conduct their own beacon surveillance through iOS and Android.
-- Michael Kwet, New York Times

I'd like to think that life-long WordPress users are a bit ahead-of-the-game, here, since we have been dealing with suspect apps (Plugins in WordPress-speak) for so long. To be fair, security problems are rarely intentional, but that is why installing any Plugin in WordPress or app on a phone is so dangerous. It is very difficult to perform effective edge testing on these apps, without expertise in the underlying system (WordPress core, Android or iOS).

-- Scrib

Despite the privacy-safe assurances, data privacy and security experts question whether mobile location data, even when deidentified, is safe from re-identification if leaked, hacked or obtained by law enforcement. Others worry about the consequences of predictive modeling or machine learning techniques that determine with high levels of accuracy whether a simulated person might visit a particular location at a particular time.
-- Kate Kaye, GeekWire