watchdog blog

Overexposure, Cloud Computing, and AI create the perfect storm for competitive monitoring, powered by Search and Social Listening.

Why do watchdogs listen to search engines?

The Neuroscience of Everybody’s Favorite Topic by Scientific American researched that our favorite communication topic is ourselves because it feels good. There is a better way to gather information – called Search Listening.
Why? Because people’s search for information is, in itself, information. When and where someone searches for facts, quotes, brands, persons, things, or help tells a lot about what they really think, really desire, and fear.

Read More »

Everybody Lies – Google Knows

Seth Stephens-Davidowitz offers revelations that can help us understand ourselves and our lives better. Drawing on studies and experiments on how we really live and think, he demonstrates in fascinating and often funny ways the extent to which all the world is indeed a lab. On sensitive topics, every survey method will elicit substantial misreporting.

Read More »

Cellphone Spies – Eric Snowden on the State of Surveillance in 2020

Eric Snowden runs down the history and state of surveillance in 2020. Cellphone Spies in traditional telecommunication and internet messaging are the norm. And not all of that is bad. But data analytics needs responsibility and ethical respect. There´s no room for stupid people, as networks get even faster and more services will be connected.

Read More »

The Wolf – espionage showcase

The Wolf – is a series of Hollywood Style Short Movies. The series showcases espionage and potential network vulnerabilities. The movies centres heavily on cyber warfare and espionage. The Wolf is starred by Christian Slater.

Read More »

How do vertical search engines get their results?

Like any generic search engine, vertical search engines consist of crawlers, an index, and an algorithm. But vertical search engines are trained to optimize in their very special direction. You will not find the same level of information and ranking in generic search engines. Searchlistening in generic search engines can be like drinking water from a firehose.

Read More »

Information warfare and Data Leaks

Information warfare systematically collects insights from data leaks on publicly available social profiles. The Trump campaign by Cambridge Analytica showcased how easy identity theft can happen. The story started as a well-executed campaign but ended as a moral disaster for Facebook and Cambridge Analytica.

Read More »

Go-To-Market Roadmap -Implementation Gateways

Go-to-market Implementation means taking a tech innovation to a new market. In our case, this refers to the European market entry of US-based Ad Technology specialists like Digital Envoy and Atlas, Microsoft Advertising. The concept is to understand the local competition before investing in local infrastructure. Recruited bridgehead partners and customers played a crucial role in the successful market entry. We were privileged to help these great clients to enter the market fast and scale their operations.

Read More »

NABC method by the Stanford Research Institute

The NABC method was developed in the USA by the Stanford Research Institute as a tool used for the development, assessment, and presentation of ideas. Using the NABC method requires a thorough knowledge of the value proposition. It is part of the plan itself to generate relevant and specific questions

Read More »