Barney's Blog

Blog archive

You Got Googled

Google is a pretty good search engine, Gmail is a decent (though intrusive) e-mail system and Google Maps doesn't make nearly as many dumb mistakes as MapQuest. And Google Apps are generally pretty good. All this goodness makes it an easy choice for many to move their computing lives over to the Google cloud.

But here's a cautionary tale from a man who calls himself Thomas Monopoly (but whose real first name appears to be Dylan).

Dylan, er Tom, trusted Google enough to put photos, videos, calendars, documents, e-mail messages and his e-mail address, as well as bookmarks, contacts and banking info into the Google cloud. Oh, and his Web site, for which he paid, was also Google-driven.

All was fine until a Google computer decided that Tom, er Dylan, violated its terms of service, but apparently offered no details. All of Dylan's, er Tom's data, Web site, and e-mail address were purged. Gone for good.

With most companies you can at least reach a real person -- however, the outcome may not always be satisfactory. For Tom, er Dylan, all he got was Web and e-mail support from Google supporters. He finally heard from a real Google employee who tried to help to no avail.

I love the cloud, but only use it for ancillary tasks and for backup.

What is your experience? Come clean at dbarney@redmondmag.com.

Posted by Doug Barney on 07/27/2011 at 1:18 PM


Featured

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.