Thursday, March 28, 2013

Dirty smartphones: Devices keep traces of files sent to the cloud

  Dirty smartphones: Devices keep traces of files sent to the cloud | Google chooses thousands as Glass 'Explorers'
 
  ITworld Enterprise Networking

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Win a copy of 'The Book of GIMP'
Enter today for your chance to win. The drawing ends March 31. Read More


RESOURCE COMPLIMENTS OF: NetApp

Got a virtual machine?
Try the industry-leading virtualization platform and #1 storage OS. Download the VMware® and NetApp® trial. Learn more www.netapp.com/dataontap Learn more www.netapp.com/dataontap

WHITE PAPER: APC by Schneider Electric

Small Data Centers: Unique Challenges, Unique Opportunities
This whitepaper shares real-world trials and tribulations from data center managers in the trenches who deal with the unique challenges of running a data center in constrained space - as well as solutions. Vendor neutral. Learn More.

Dirty smartphones: Devices keep traces of files sent to the cloud
When smartphone users upload files to cloud-based services, remnants of those files often remain on their handheld device, even if the data is meant to be stored only in the cloud, researchers have found. Read More

Google chooses thousands as Glass 'Explorers'
Google said Wednesday that it will reach out to "several thousand" people through Twitter and its Google+ social network to take part in its Explorer project for trying out its computerized eyewear. Read More

Social networking drives business processes at Pandora and Rosetta Stone
Pandora and Rosetta Stone have embraced social business tools and the cloud to cut costs, increase productivity and improve collaboration. Learn how these two companies overcame security concerns, gained executive buy-in and more. Read More

AWS takes aim at security conscious enterprises with new appliance
In a bid to improve data security, Amazon Web Services (AWS) has launched AWS CloudHSM, which uses a separate appliance to protect cryptographic keys used for encryption. Read More


WHITE PAPER: Phoenix NAP

Eliminate Virtualization Management Challenges
This whitepaper will explore the hard realities of cloud computing and will seek to provide insight into what large and small enterprises should look to as they begin their quest for increased cost savings and reduced capital expenditures. Learn more.

How to remotely inspect the DOM on a mobile device
How often have you as a mobile web developer struggled to diagnose a style or layout issue on a particular device through trial and error? Wouldn't it be so much easier if you could just inspect the DOM on the mobile device as you would on the desktop through Chrome or Firebug? It turns out there is a tool for that. Read More

Facebook starts testing targeted ads in News Feed
Facebook has started displaying targeted ads in some users' desktop News Feeds in a test of Facebook Exchange ad delivery system. Read More

Chat app Line releases safety guide for girl teens after string of incidents
Line, the chat app that is exploding in popularity in Japan and other Asian countries, has published an online safety guide for teens after a string of incidents in which it was used to maliciously target young women. Read More

African TLDs, ISPs implement DNSSEC to attract more users
Africa's country code top-level domains and Internet service providers have implemented DNSSEC (Domain Name System Security Extensions) in order to attract more users. Read More

 

BOOK GIVEAWAY

Our March contests are coming to an end. Enter before March 31 for your chance to win!

jQuery, jQuery UI, and jQuery Mobile: Recipes and Examples
This guide brings together more than one hundred self-contained, downloadable examples, each with an in-depth explanation of how the code works and how to adapt it for your own needs.

The Book of GIMP: A Complete Guide to Nearly Everything
Whether you're just getting started with this free Photoshop alternative or working to master GIMP's more complex features, you'll find the answers you're looking for in The Book of GIMP.

DON'T MISS...

Killer open source admin tools

20 historic tech sounds you may have forgotten

Smartphone comparison: Samsung Galaxy S4 vs. Sony Xperia Z vs. HTC Ones

The best office apps for your iPad, round 4

25 crazy and scary things the TSA has found on travelers

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_networking as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.