Feeds

Buffy's heart gets wrong kind of flutter from Google Buzz

Vampire Slayer flees creepy social web

The Power of One Infographic

Social tinnitus Google Buzz hasn't just upset social web mavens, it's also alarmed US actress and sometime Vampire Slayer Felicia Day too.

The flame-haired tellybox star unwittingly found herself trapped deep inside the Gmail Buzz vortex yesterday. But after a quick look around she turned off Mountain View Chocolate Factory's creepy social networking service in her account.

"Buzz things turn up as a message in your inbox?! Disabling now. Heart attack," she tweeted, oops, buzzed.

Very quickly, Day's followers responded with a slurry of messages from fans eager to help the distressed teevee star.

"Can u disable it?," wondered Buffy lover Michael Jones.

"It is scary but at least I get to see more Felicia Day posts. They get buried in Twitter sometimes," he noted.

By that point, however, it seems Day had already ditched Buzz, but that didn't stop people posting to the feed for the best part of Thursday.

Buffy says buzz off

Battling the undead

So well done, Google. You've actually introduced a spanking new sleb stalking tool that might be even more effective than the extremely self-aware Twitter tombola that plebs regularly shake to see what falls out.

Yesterday, news of the death of British fashion designer Alexander McQueen led to Twitter quickly taking down his account, presumably before it was besieged by fans, hacks and perhaps even a friend or two.

But Google's Buzz, which the company automatically applied in a stealth-like strategy to millions of Gmail accounts earlier this week, seems to have upped the non-privacy ante.

Harvesting online data has never felt so dirty. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
That AMAZING Windows comeback: Wow – 0.5% growth in 2015
Whoooah, my face is going all floppy with the speed
'I don't want to go on the cart' ... OpenSSL revived with survival roadmap
Heartbleed-battered crypto library reveals long path back to health
Linux turns the crank on code for cars
Got a feel for your automobile
Google policy wonk patronises Brits over EU search biz probe
Downgrading rivals? Whetstone: 'I just don't think it's really true'
Victim of Tor-hidden revenge smut site sues Tor Project developers
But EFF lawyer says deep-web team 'no more liable' than web server makers
Chrome Remote Desktop adds Linux to supported OS list
Drive Debian from the confines of a Chromebook
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
The Power of One eBook: Top reasons to choose HP BladeSystem
Only the Power of One delivers leading infrastructure convergence, availability and scalability with federation, and agility through data center automation.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.