| Old Articles: <Older 1751-1760 Newer> |
 |
AskMen.com Phil Helm |
How To: Use Google Here are a few operators to maximize your search in Google.  |
InternetNews January 4, 2008 |
JDate.com Owner Spark Networks Seeks Buyer: Report Spark Networks, home to popular Jewish online dating site JDate.com, is seeking a buyer and is talking to leading social networks and Web dating communities.  |
InternetNews January 3, 2008 |
Social Networking Site Plaxo For Sale? Plaxo, an early social networking site that has been overtaken by Linked In and Facebook in popularity, is up for sale.  |
Information Today January 2008 Paula J. Hane |
Google 2.0 as `Calculating Predator' Google version 2.0 is a new type of company, combining hardware and software engineering in a network-centric application platform.  |
CRM January 1, 2008 Marshall Lager |
Fresh Meat, Social Media Style Hope you like the taste of crow - or foot-in-mouth. Your customers are serving it up hot via blogs, social networking, video sharing.  |
CRM January 1, 2008 Jessica Tsai |
Facebook's About-Face Facebook introduced a marketing plan many of its members hated - and changed course accordingly.  |
Searcher January 2008 Ashmore & Grogg |
The Race to the Shelf Continues Internet giants are in the middle of a modern-day space race: Who can scan the most and the best books in alliance with the biggest and brightest libraries in the U.S.  |
InternetNews December 28, 2007 Sean Michael Kerner |
Microsoft Expands Security Reporting Microsoft's new Security Vulnerability Research and Defense blog is designed to provide additional, in-depth technical details on Microsoft security updates.  |
IEEE Spectrum January 2008 Sandra Upson |
Loser: Social Networking Goes To The Dogs A $200 RFID dog tag tells owners -- and their neighbors -- when their pets are alive, at home, and sniffing things, all online.  |
InternetNews December 28, 2007 Mike Elgan |
Here Comes The 2008 Beijing Olympic Disaster A half-million visitors will upload everything they see to YouTube, LiveLeak and Flickr. What happens when the "Great Firewall of China" is breached?  |
| <Older 1751-1760 Newer> Return to current articles. |