Archives for posts with tag: twitter

A look into Generation Y and its affinity for web start-ups and iced coffee

by Lory Martinez

The Startup Guys, complete with smart-phones and energy drinks.

Popular comedy site, College Humor, on the Web Start up Culture:

http://www.collegehumor.com/video/6507690/hardly-working-start-up-guys

This parody isn’t too far from the truth. Generation Y ( 18-29 -year-olds), or as they’ve come to be called, “20-somethings,” are growing up and driving the internet economy.  As such, it isn’t too uncommon to hear about a youth fresh out of college joining or even starting a  brand-new social media or technology company.

In fact, there are so many startups these days, it’s hard to keep up. Some immediately gain popularity, like Facebook and Pintrest but, all too often, others die down as quickly as it takes for a user to close out their browser.

It’s easy to make fun of these 20-somethings who have made a name for themselves through websites that range from Kloff, the app for pet-lovers to Triggermail, a personalized email site for  e-commerce. But the truth is, with all their fancy offices and user-friendly interfaces, they are a major part of the media business.

Unconventional office space: check.

Dreams that their grandparents would never have imagined having at all are now possible. In that sense, generation Y is proof positive that if given the chance, young people can create just about anything.

Related articles

A look into online profiles and how much they affect employers’ decisions in choosing new hires.

by Lory Martinez

Spring Cleaning your online presence

This week we’ve done a number of stories on online profiles. And now, as graduation and the real world fast approach, it’s time to clean up,( If you haven’t already) that online persona.  Warning: A virtual suit and tie may be required.

According to a recent study, up to 37 percent of employers check social networking sites before even considering an employee for an interview. Up to 90 percent  of employers are hiring through social networking sites such as LinkedIn, Twitter and even, Facebook.

In my recent interview with avid social media enthusiast, Jessie Rubin, we both noted that social media is who we are. As the generation that both created and produced the social media boom, we are indeed defined by our presence on the internet.  Ten years ago, email and instant messaging had only just begun to flourish, slowly collecting a kind of cyberhistory that has evolved and expanded into the myriad of platforms we use to communicate and express ourselves today.

Remember AOL instant messenger? Myspace? Remember the days of funny email addresses we made up for those accounts?

Aol Screenames circa 2002: chatingchuck, and any cat variations thereof

Now as kids grow up in this  “living yearbook” world, they have to be careful, because, in the same way an embarrassing photo from high school can come back to haunt our parents once they are found in the attic somewhere, our  “YOLO” moments can come back to bite us. And those are way easier to find.

So here are a few tips I’ve collected throughout my own years of experience with social media. Special thanks to those who have given me this professional advice and much more over the years.

How to clean up the digital you:

  • Check your privacy settings on all social platforms. Make sure you have to approve things before anyone can post them in association with you. We all ignore those emails from Facebook about updated privacy settings, but be sure to at least check your own settings
  • Google + is a useful tool. Even though a lot of people say it will never become popular in terms of social networking, you can at least help employers easily find you via Google search, and with a comprehensive profile, you can even direct them to your work.
  • Get a LinkedIn, if you don’t already have one. Even if all your connections are classmates, they will soon have jobs in the real world, just like you, and can help you later on.
  • Look through your photos you’re tagged in, make sure the photos represent the best version of you, the one that would make an employer think, “Yeah, I would definitely trust him/her with important tasks.”
  • Have a fancy profile photo or two. You should have a photo in a nice outfit  for your  job search profiles including Google + and LinkedIn. Keep it casual and fun for your other profiles, but maybe leave the beer can out, at your discretion.
  • Opinions are opinions are opinions. Yes, your opinion matters. Yes, it’s just as valid as any other. But be weary of ranting in public. The internet is vast like the ocean but it can also be as tiny as a small puritan town. Don’t be Hester Prynne. Gossip travels fast and so do viral posts, so make sure you don’t end up like this guy.
  • Don’t over-do it. Don’t go deleting your entire profile history and consider starting from scratch. Starting over is fine, but if there are no photos, or posts of you from before last week, it will be as if you never existed before last week. Don’t lose yourself, or your “digital” self in the process. It’s about cleaning up what’s there, not replacing it entirely. As the saying goes, “Work with what you’ve got.”

That’s about it folks. Have fun Spring Cleaning!

A look into Anonymous‘ most recent cyber protest

By Lory Martinez

OP USA Poster

Infamous hacker group “Anonymous” threatened a massive cyber attack on US servers earlier this week  to protest American foreign policy. The plan, dubbed #OP USA, was to be Anonymous’ successful follow-up to #OP Israel, but it did little to no damage to US sites.

According to the group’s press release, “#OpUSA will be initiated on 7th of May 2013 and will target American websites & servers. The hackers say they are targeting the USA for its war crimes in Iraq, Afghanistan and Pakistan. The hackers also said the attacks will be done in solidarity with the innocent victims of american drone attacks especially the innocent children.”

However,the plan backfired and instead reinforced relations between the groups’ victims-the US and Israel- in cyberspace. The Times of Israel reported that Israeli hackers promised to fight alongside American cyber-defenders, if the need should arise. The Israel Elite Hacker team, formed in the wake of #OpIsrael, tweeted, “This is a message from the Jewish Nation to our friends in the #USA,” the group said. “Although we have cowards for leaders, we take care of our friends!”

In the states, our cultural response had less of a “friends stick together” feel. It was simply a matter of memes:

The Internet reacts to #OPUSA

Some food for thought, from all of us here at The Media Review.

A note: Even though the semester is over and our show ended this past week, we will still be bringing you updates and commentary on the media well into the summer. Thanks for listening and reading!

LinkedIn

LinkedIn (Photo credit: Wikipedia)

A look into how LinkedIn works

Image representing LinkedIn as depicted in Cru...

Image via CrunchBase

By Alex Baer

LinkedIn recently celebrated its 10th birthday last Sunday. LinkedIn, sometimes referred to as “the Facebook of networking,” allows people to network with those they have worked with before, or those they would like to work with in the future.

It also allows users to build an online resume, easily accessible to potential recruiters. There is also a premium account offered. Users can pay for a different facet of LinkedIn: Business, for business professionals, Talent for recruiters, JobSeeker for the unemployed (or the curious employed), andSales for sales professionals. There are over 200 million LinkedIn users worldwide.

In July 2011, LinkedIn launched a new feature to the website: posting job openings directly on their website, and allowing users to apply from LinkedIn, linking their LinkedIn resume to their application.

Forbes once called it  “far and away, the most advantageous social networking tool available to job seekers and business professionals today.”

But enough with all the glitz and glamour. What does the data say? Perfect data is a little hard to find, as LinkedIn hasn’t traditionally published much about hiring statistics. Let’s parse through what we can:

-Back in 2010, a report was released that found that 50% of Fortune 500 Companies use LinkedIn.

-LinkedIn gets almost six times the number of job views than Twitter, and almost 12 times that of Facebook. LinkedIn also gets more than 8 times the job applications than Facebook, and 3 times more than Twitter.

Roughly half of LinkedIn users have anywhere from 0 to 500 1st degree connections, but the average LinkedIn recruiter has around 616, and 28% of LinkedIn recruiters have over a thousand connections!

-Of recruiters who use social networks to find potential employees, 48% use only LinkedIn, but only 1% solely use Facebook or Twitter.

-Potential growth is also a factor in networking. To double one’s network on Twitter, it takes only 2.7 months, or roughly 81 days.For LinkedIn, 7.6 months. For Facebook, a whopping 33.9 months (or just under three years).

– Traditionally, the most successful job postings and hirings seem to be sales. As of August 2011, there were about 6.1 million active members on LinkedIn who identified as working in sales. Academics, administrators, engineers, and IT specialists trail in the 4 to 5 million range.

-LinkedIn does have a number of immediately obvious advantages over Facebook and Twitter; namely, no teenage-angst, there’s little spam (as users are trying to create a likable persona), no vague relationship statuses, no birthdays to remember, changes to the user interface are fluid and appealing, but, most importantly, no Pokes.

-It also would appear to lend itself very well to the newest generation of job hunters: us. Having grown up with social networking as much a part of our lives as the duck and cover method was to the Baby Boomers. Sure, for every suave, future New Yorker columnist, there are half a dozen duck-facers, but growing up with “the game” from AOL Instant Messenger to Google Plus, but we seem to have a distinct advantage over the previous generation. As we mature, we learn how to conduct ourselves in the “real world,” but we also draw upon what we have learned.

Image representing LinkedIn as depicted in Cru...

Image via CrunchBase

A look into the job search of 2013

By Lory Martinez

It’s May, and with it comes the end of another semester here at Binghamton. However, that by no means signifies an end to work. Today we’ll be talking about things to keep in mind for seniors who are in the midst of the job search.

For this show, I conducted a special interview with Jessie Rubin, a graduating senior  who has done a number of internships over the course of her college career. She hopes to work in journalism after graduation and has worked for quite a few “big-name” places. I spoke with her about how much her online presence in social media affected her in her job and internship search.

Be sure to check it out at 4 pm on whrwfm.org or, if you’re in the Binghamton area, on 90.5fm Binghamton.

*Full interview will be posted later this evening.

De facto flag for the Anonymous group. Español...

De facto flag for the Anonymous group.  nonymous (Photo credit: Wikipedia)

A look into the group some are calling the “Internet Robin Hood”

by Lory Martinez

In early April, hacker group Anonymous, the so-called “internet-vigilante/digilante” group that has launched several international hacking campaigns against governments and organizations, hacked several hundred Israeli websites and a number of twitter accounts as a part of a campaign called: #OPIsrael in protest against Operation Pillar of Defense in Gaza. Their goal? To erase Israel from cyberspace.

One spokesperson for the group tweeted at an Israeli official, “It would be wise of you to expect us.” An announcement on their website said, “Stop bombing Gaza. Millions of Israelis and Palestinians are lying awake, exposed and terrified.”

In effect, no harm was done to anyone in “real life.” Even so, it made for an intriguing back- and- forth twitter war between Anonymous and Israeli officials about exactly how much damage was actually done to Israel’s cyber identity.

Weeks later, the same group launched a campaign against North Korean leader Kim Jong Un, defacing social media accounts and North Korean websites. They also propogated an image of Kim Jong Un as a pig, all over the internet. As of April 15, the group still has control over several Pyongyang Twitter accounts.

Now there is much to be said for this particular type of cyber-attack. Aside from Anonymous’ previous governmental website hacks, which border on a national security issue, these are policy protests that make a statement about the level of influence cyberspace can have, on, say, something as large and influential as a country. The threat of erasing Israel from Cyberspace caused more than just server inconveniences. These hackers are making their voices heard by typing away on a keyboard. A sign of the times? Or a cautionary tale for governments in the future?

A look into Cybersecurity in light of the most recent security breaches on Twitter

by Alex Baer

credit: pehub.com

“Breaking: Two Explosions in the White House and Barack Obama is injured.”

It took less than half of a 140-character tweet for a mischievous hacker to send major news outlets scrambling, stocks plummeting, and just plain make a mess last Tuesday. Rest assured, the leader of the free world is alive and well, minus some on-the-job stress, the New York Stock Exchange has largely rebounded to where it was before the tweet, and the Associated Press has regained control of the account.

With that, cybersecurity is no longer a curiosity for Wired, the butt of a joke on Facebook, or the basis of a scene from a Christopher Nolan Batman movie- it’s in everyone’s mind, and its intent comes across as downright malicious. Hacking is nothing new; it took off in the early 80s, and hasn’t slowed down much since then. It certainly lends itself well to simple pranking, political activism and even high-level military operations (read up on the Stuxnet worm- which we haven’t the time for- as it’s a fascinating read!).

Attacks like the one that befell the Associated Press Twitter account, unfortunately, are starting to become more and more common. Back in May 2011, hackers took control of PBS Online, and published a report stating that Tupac had been found “alive and well” in New Zealand. British tabloid The Sun was hacked a few months later by hacker group Lulzsec; their home page read that media mogul Rupert Murdoch had been found dead of an apparent drug overdose.

The Syrian Electronic Army has claimed responsibility for the attack, tweeting from the @AP_Mobile Twitter handle that “Syrian Electronic Army was here.” The SEA also appears to have included other big media accounts in what seems to be a coordinated attack, not the least of which is British newspaper giant The Guardian. Both the Twitter account for CBS’ 60 Minutes and CBS Denver were hacked, and tweeted statements supporting the Assad regime in Syria, criticizing Obama for “trying to take away your guns” and supporting “terrorist” rebels.

Twitter has announced that they are working on a two part authentication system to solve their hacking woes, but have yet to release it to the public. In a statement released a few days ago, Twitter warns “We believe that these attacks will continue, and that news and media organizations will continue to be high value targets to hackers.” Later on in the memo, Twitter also urges its users to take necessary precautions with their cybersecurity.

Though it might just seem like a bunch of hot air, or the same BS you’ve heard many times before,  it really goes to show that

we really don’t do enough to stay safe online. No, I’m not talking about locking up your computer cabinet, or resetting every one of your passwords… though the latter might be the case if you still use “password1” to log in to Facebook. Don’t send your password to anybody online; do it in person, or with a paper trail if you need to.