Review: The full buzz on Google Buzz
A hands-on text and video tour of Google's latest rollout
Computerworld - This week Google whisked back the curtain on Buzz, its dive into the world of social-networking technology.
Buzz is a mixed bag -- a combination of good ideas and bad implementation -- and it needs more refinement before it can be a serious contender in the world of Twitter and Facebook.
In the following pages, I examine some of the basics of working with Buzz and some of the problems -- a few of them troubling -- I found along the way. I also made three videos in order to better illustrate how Buzz works: setup and options, posting, and followers and profiles. You'll find a video at the end of each page of this article.
The Buzz basics
If you're one of the lucky folks who've gotten access to Buzz -- Google has been rolling Buzz out gradually to Gmail users -- you can find it by logging into Gmail. There, under the Inbox, you'll see a "Buzz" folder; click on it to get things rolling.
Most any current browser will work with Buzz, although for the sake of consistency I used Google's own Chrome to make sure everything worked as expected.
Buzz works as a generic "here's what I'm doing" feed, where you can post text, links or multimedia. Posting a photo can be done by either uploading the image directly from the browser or pointing at a file in your Picasa account.
If you post a link with a URL in it into your feed -- either by pasting the URL right in the text box or by clicking "Insert Link" to add it -- Buzz automatically detects it and attempts to pull pictures from the linked page, which you can then include for context. (It's similar to Facebook in that respect, but works a bit better.)
People can choose to follow you, or you can choose to follow them, by adding names from their/your Google contact list or from a public Google profile. Unlike Facebook, where people who want to "friend" you can't follow your feeds unless you "friend" them back first, people can follow your Buzz feeds immediately, although you are notified when that happens and can then choose to "unfollow" them at any time.
You can also post to the general public -- making Buzz a bit like Twitter, insofar as anybody with an account can see your post. (This ties into the mobile version, which interacts with Google Maps so that Buzz users can view public messages depending on their location and the location of the person who sent the post.)
Interestingly, Google seems to occasionally decide whom you want to follow without consulting you -- for example, one Buzz user reported that she found the e-mail address she uses to send data to her Evernote application on the list of contacts she was following.
- Lawmakers want FTC probe of Google Buzz
- Mike Elgan: How Buzz, Facebook and Twitter create 'social insecurity'
- Google slapped with class-action lawsuit over Buzz
- Google fixes Buzz bug
- After outcry, Google revamps Buzz networking application
- Mike Elgan: How Google Buzz for mobile will change your life
- Google tweaks Buzz to address privacy concerns
- Image gallery: The full buzz on Google Buzz
- Review: The full buzz on Google Buzz
- Google feeds mobile social craze with a little Buzz
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts