• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Verified Profiles and Names in Social Networks : All the Mysteries

By Abhishek Ghosh August 14, 2013 1:47 am Updated on October 17, 2014

Verified Profiles and Names in Social Networks : All the Mysteries

Advertisement

Verified Profiles and Names in Social Networks are kind of Internet achievement to many users. Here are some information that might be helpful. First thing is that, I am at the time of writing do not hold a verified name but I am a Verified Author – I wrote a lot about that, it is not very common thing at all. You can read them – Google Authorship Search and tbs and ppl_ids and Personalized Google Authorship Confirmation Email. You can click this link to see that search result about Dr. Abhishek Ghosh. I have used anonymize url so that you can view a splash screen with the full url for few seconds before you land to Google’s search result. People usually ask a lot about Verified Profiles and Names, you can read about Optimizing Name in Google Search For Professionals and Famous Persons in this case. If your target is to get a special looking search result, then your way is different and easily achievable. I am going to that part later. First solve this Craziness for Verified Profiles and Names in Social Networks. It is a craziness, often people offers money via contact us email or social networks -“How much is your fees for it…”. Well, if I knew then I would apply on me first ! No, it can not be applied right now on me. That is why I am writing. May be you are reading this article, suppose after 1-2 years, when Google for example, has verified my name. It really does not matter at least to me. But these are the things I found, which might make you happy.

 

Verified Profiles and Names in Social Networks : Number of Followers Never Matters

 

Two examples :

 

  1. Matt Mullenweg has Verified Twitter Profile. When he got the badge, if my memory do not betray, he had 40K followers, at the time of writing he has 58K followers. He is not alone, there are many who has lesser followers than him with a blue verified badge.
  2. Tim Cook (this is neither Apple’s Tim Cook, nor Dr.Timothy Cook, he is quite important too and is about mlhim.org which we mentioned in Semantic Web)

None of them have ‘circumvented’ or used some kind of Black Hat. Indeed, I personally noticed that Tim Cook got a kind of astonished after noticing it, I noticed that a week before him ! Both of them are IMPORTANT. This is the keyword. So, target to become an important contributor of the society first – be you are an actress, singer or blogger. There is no other of ‘faking’ somehow. These are manually checked. My profiles do not have the needed informative links where from they can be 100% sure that I need a verified name. Verified Profiles and Names in Social Networks are for prevention of fake accounts. If I, for example create a fake account of Tim Cook with all of his data and write a post on Google Plus attacking a renowned person, there is enough chance of starting of a Troll. There are many examples of persons who has very limited presence on Internet but has verified accounts. The person matters.

Advertisement

---

 

Verified Profiles and Names in Social Networks : Google is Easier

 

Google is not very much conservative about the number, at least. They are really interested about making the points sure. But, if you need a named vanity url, you can use a named Page or a Local Business – these are fully legit if you really need it. Page verification is easier than profile. Local Business, Maps etceteras are important for doctors, lawyers, educational institutions.

Verified Profiles and Names in Social Networks

 

Verified Profiles and Names in Social Networks : Break the Myths and Get the Truths

 

  1. Wikipedia Page : Having a Wikipedia Page, possibly gives a weight for the person. But that page has been approved because the person is really mentionable. Take that, you have found some way to create a Wikipedia Page (I do not know if there any shortcut exists), that will give you two things – a special looking search result page for your name plus possibly the verified accounts.
  2. I have no Wikipedia Page about me or Never Have Received a Verified Email Like You But I am dying to Get a Special Looking Page in Search Result : Go for Google Page or Local Business. If still you can not achieve, then there are lot of peoples with your name. It is very much true for me – there are at least 5 Dr. Abhishek Ghosh. The problem gets intensified if multiple same named people are quite closer in contribution – its obvious, people who will verify will get confused plus it is bad to highlight one. Survival of the Fittest will take place. It will take more time.
  3. Published books with ISBN , ISSN numbers; specially when print version is/are available via good publishers adds a bit more plus points.
  4. Paying Google for some Services via Credit Card has very light is possibly a wrong idea to ‘bribe’.
  5. Number of followers never matters. Do not buy followers and waste money for this hope.
  6. Using Twitter Ads is not a way to get verified.
  7. There is no service exists (white hat) who can offer a verified profile service.
  8. Using same cell phone, own credit card, uniform email address; at least adds more security – this are good practices plus helps to verify the eligibles.
  9. Please do not use an image to fake a badge. It is really bad – there can be a same named important person, whom you never heard of.

 

Verified Profiles for Twitter

 

There are peoples who claims to provide service for getting account. It is my personal opinion that, it better to avoid such gray services which costs over 5K USD (one person emailed me for such query whether she will use such service). Twitter uses third party to handle these, plus the verified account of Twitter will follow you and send you DM. I have no idea about Facebook, possibly they uses the way like Twitter, but they are a bit transparent :

https://www.facebook.com/help/196050490547892

so is Google for Pages :

https://plus.google.com/109164280656499025716/posts/8E3ryWFu4jV

Most of the paid professional social networks has no verification thing – LinkedIn, deviantrt. None of these possibly used by (at least for the most) film stars, that avoids the rush of fan. Possibly the need of verification was for fan base at the beginning. Actually these Twitter, Facebook like Social Networks logically should ask for the Identity or provide a way to apply rather than making it a kind of guess based game – it is a problem for few important professionals. Google through Pages has shown that real utility of verification. Pinterest verifies all through domain.

 

Abhishek-Ghosh Tagged With https://mobile facebook com/help/196050490547892?_rdr

This Article Has Been Shared 368 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Verified Profiles and Names in Social Networks : All the Mysteries

  • SSL (Secure Sockets Layer) and TLS (Transport Layer Security)

    SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are hybrid encryption protocol for secure data transmission in the Internet. SSL was predecessor.

  • Self Hosted WordPress on Cloud Server for Dummies

    Self Hosted WordPress is itself a scary phrase to a non-tech person and add Cloud Server on it. Here is Very Easy Guide to under Self Hosted WordPress.

  • Command Line Web Browsing : Full Guide

    Command Line Web Browsing is of fun, useful and actually fast and safe. We can use Lynx, Links like Free Software on UNIX / OS X, Linux or Windows to surf.

  • Single Sign-On Solutions : Interfaces, Security and Ease of Usage

    Single Sign-On Solutions must maintain a standard. The three criterion for picking up a Single Sign-On Solution is 3 – Interfaces, Security and Ease of Usage.

  • Eight Tips for Secure Cloud

    Eight Tips for Secure Cloud are for are using the extremely useful services whose security are still regarded as uncertain. What users can do in this situation?

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Configuration Management February 5, 2023
  • What is ChatGPT? February 3, 2023
  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Verified Profiles and Names in Social Networks : All the Mysteries," in The Customize Windows, August 14, 2013, February 5, 2023, https://thecustomizewindows.com/2013/08/verified-profiles-and-names-in-social-networks-all-the-mysteries/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT