IDG News Service - A Google Inc. employee mistakenly posted information to an official Google blog that she had intended to publish in her personal blog -- the latest blogging faux pas for the search engine giant.
On Tuesday, two postings about skull-shaped candies appeared on Blogger Buzz, the official blog of this Google blog publishing service. Their topic and informal tone immediately led readers to wonder about their legitimacy.
Google removed the postings quickly after they were published, a Google spokeswoman said via e-mail on Wednesday. The employee who published the postings by mistake is a regular contributor to Blogger Buzz, the spokeswoman wrote.
Last week, Blogger suffered an outage that kept both Blogger.com and the Blogspot hosting service off-line for two hours. That kept the many official Google blogs that are hosted on the Blogger platform off-line. Google later said a "network malfunction" caused the outage.
Earlier this month, a hacker broke into Google's main official blog, which is hosted on Blogger, and posted a false message saying that the company had decided to cancel a joint click-to-call advertising project with eBay Inc.
Google patched the hole and removed the posting from the so-called Google Blog, but the intruder's message was widely noticed and triggered significant speculation and confusion among Google observers.
In March, Google staffers deleted the Google Blog by mistake and someone unaffiliated with the company briefly took control of the Web address.
Like all companies that store sensitive data from consumers and organizations, Google is held to a high standard when it comes to mistakes like these. Displays of carelessness or security vulnerabilities that affect Google's services undermine users' trust, critics say.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts