Think the killer point is making "synch managers" responsible for far fewer songs than traditional publishers.
They're effectively treating each song as an artist with its own manager, so naturally that manager is gonna be much better able to see how and where to place "their" songs.
This isn't really the case anymore. Can't remember when but he was thoroughly reined in a little while ago. All the shock troll PR about standing seats and paid toilets worked for a while til it didn't. They're just a cheap, no-frills airline now.
Complying with payment card industry (PCI DSS) requirements is an absolutely insane process, even if you're vaguely technically literate.
Obviously not saying payment processing isn't an incredibly important area to enforce good security practice. But it's a lonely place to be when you're attesting to hundreds of ridiculous requirements relating to your overpriced, off-the-shelf POS system and anything/anyone that touches it.
Maybe you're certifying at a lower level. I had to prove pretty much everything.
We have a "wallet" function, in support of which there's a DB that stores encrypted credit card numbers (they're encrypted by the app, so the DB never sees the cleartext). Obviously this database is backed up periodically. The auditor forced me to restore one of those backups and show them the content of the restored table, in order to prove that the backup/restore operation didn't magically decrypt the data.
This is something that I would have been willing to sign any document to certify, without having actually run the experiment. But they wanted screenshots.
They also told us that all employees need to have obfuscated email addresses to protect against spear phishing. That's when the infosec team finally told them they were being ridiculous.
Either the AV ties into the kernel with a module, in which case it can also be an avenue for an increased permissions exploit, or it doesn't have any special kernel level capabilities, in which case it will never find rootkits that include kernel modules to hide themselves.
Personally, I would be happy with an open source community based disk scanner looking for weirdly named files and folders (there are common variants used in hacks) and a locked down selinux config. Bonus points if you compile a kernel that doesn't allow modules (but IIRC that doesn't preclude kernel level shenanigans).
Interestingly, it looks like since the PCI requirement for AV is for "all systems commonly affected by malicious software" they don't actually require it of all Linux systems in all cases.[1]
The Bialetti moka pots are different, although they look similar. They are heated on the stove-top, and water moves from the bottom chamber, through the grounds, to the top chamber under pressure.
The drip-o-lator style pots are NOT heated on the stove-top (a separate kettle is used), and the water moves from the top chamber, through the grounds, to the bottom chamber via gravity.
What if people know they're not getting the fastest/biggest/best but pay a premium anyway? It might be a trope but "it just works" is a heck of a value proposition for most people.
All true, but as a potential advertiser you don't really get to use all that targeting when placing ads. Although to be fair that's mostly based on my experience with AdWords.
On Facebook I can advertise to people in a well-defined geographical area, who are interested in a scarily well-defined set of things.
On Google it's more of a just-in-time approach; catching people who are searching for something in a certain place etc.
My business doesn't lend itself to Amazon ads, but I can totally see how it'd generate an ROI far exceeding Google or Facebook for product businesses that sell on Amazon.
> On Google it's more of a just-in-time approach; catching people who are searching for something in a certain place etc.
Adwords location targeting options have been around some time with 3 targeting options for location: http://prntscr.com/kq9coa
And my advice when using this - Adwords defaults to "People in, or who show interest in, your targeted locations" but I would recommend "People in your targeted locations" as the first seems to be a very loose definition by Google and in my experience brings in dud traffic.
Location settings are one of the common set-up mistakes when I see client historic accounts. And there's some good tricks with combining these settings for business that need physical proximity that can make them very effective and flexible.
>as a potential advertiser you don't really get to use all that targeting when placing ads.
you don't need to. since google is interested in providing you cheap relevant clicks, it will deliver them to you without exposing all the targetings. all the data available wil be utilized in choosing the right audience anyway.
This type of "trust us, we know what we're doing" targeting is typically less cost effective for advertisers. The fact it works at all is a technical achievement to be sure, but as far as Google goes I can vouch for the OP.
Well, if you are doing direct response advertising, you can mark (with utm source) and measure any kind of performance metric (CPA, average purchase price, whatever you can come up with), and if their clicks are not cost effective, you can stop buying them.
And if you do branding... branding is hard to measure anyway.
Note -- I'm not affiliated with google in any way, I just think their offering makes a lot of sense.
If you're selling a product that's available nationally and appeals to a reasonably big demographic, you might not care much about targeting.
But if your business only supplies weddings in New York, then impressions/clicks by people who aren't planning a wedding in New York are largely worthless.
But the initial intent still has to be there. If I sell shampoo noone's gonna see my shampoo PPC ad just because they email a friend to say they've got dry hair. They have to search for a shampoo-related keyword I'm targeting.
You can definitely do the same with Google, but yes more targeting is available as you spend more. Companies spending 8 figures with DBM/AdX get direct access to the bid stream to do whatever targeting they want.