IDG News Service - A Google Inc. employee mistakenly posted information to an official Google blog that she had intended to publish in her personal blog -- the latest blogging faux pas for the search engine giant.
On Tuesday, two postings about skull-shaped candies appeared on Blogger Buzz, the official blog of this Google blog publishing service. Their topic and informal tone immediately led readers to wonder about their legitimacy.
Google removed the postings quickly after they were published, a Google spokeswoman said via e-mail on Wednesday. The employee who published the postings by mistake is a regular contributor to Blogger Buzz, the spokeswoman wrote.
Last week, Blogger suffered an outage that kept both Blogger.com and the Blogspot hosting service off-line for two hours. That kept the many official Google blogs that are hosted on the Blogger platform off-line. Google later said a "network malfunction" caused the outage.
Earlier this month, a hacker broke into Google's main official blog, which is hosted on Blogger, and posted a false message saying that the company had decided to cancel a joint click-to-call advertising project with eBay Inc.
Google patched the hole and removed the posting from the so-called Google Blog, but the intruder's message was widely noticed and triggered significant speculation and confusion among Google observers.
In March, Google staffers deleted the Google Blog by mistake and someone unaffiliated with the company briefly took control of the Web address.
Like all companies that store sensitive data from consumers and organizations, Google is held to a high standard when it comes to mistakes like these. Displays of carelessness or security vulnerabilities that affect Google's services undermine users' trust, critics say.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Exponentially Accelerate Data Protection and Recovery with Simpana 10 IntelliSnap® Snapshot Management Technology Are you making the best use of your storage array snapshot functionality? CommVault Simpana 10 IntelliSnap technology manages hardware-based snapshots across multiple vendor...
- Simpana IntelliSnap Technology Datasheet With IntelliSnap you can maximize the value of your snapshot technology while dramatically reducing management overhead and complexity.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
All Applications White Papers |