Sunday, August 4, 2013

The Reg: Lost phone? Google's got an app for that, coming this month [Mon Aug 5 2013]

The Register
Daily Headlines

5 August 2013

Hello, etechnews today.
Login to alter your email preferences Login

Check out our other feeds and services

The End User Security Jigsaw
End user security is about much more than technology level protection. This report looks at the nature of the end user security challenge.
Download now

Business News

Peter Capaldi named as 12th Doctor Who

New Tardis jockey's already been on Who and Torchwood, has time travel form

Channel News

SMBs are tumbling into the cloud? Oh get real

Column We’re barely scratching the surface

Cloud News

NASA's cloud strategy panned by NASA auditors

Houston, you have a problem

Data Centre News

Flash upstart: We're doing so well we might even tell you HOW well one day

Tintri races towards IPO: Watch out NetApp, EMC

Hardware News

Qualcomm exec on eight-core mobile chips: They're 'dumb'

'We don't do dumb things,' says man who managed Intel's anemic mobile efforts

The End User Security Jigsaw
End user security is about much more than technology level protection. This report looks at the nature of the end user security challenge.
Download now

Networks News

T-Mobile joins effort to bring Ubuntu phones to US mobile market

Signs on with Verizon, global carriers in Linux-based smartphone effort

Policy News

USA reverses iPhone, iPad sales ban

Patent reform policy saves the day

Security News

Step into the BREACH: New attack developed to read encrypted web data

Black Hat 2013 Experts reveal exploit to decrypt your HTTPS connections

Software News

Lost phone? Google's got an app for that, coming this month

Free location and remote wipe service for Android devices

Science News

Geneticists resolve human dilemma of Adam's boy-toy status

Largest Y chromosome study: Ancient Adam canoodlingly conterminous with elder Eve

Bootnotes News

BONG goes HYPER as default.gov POWERS the FUTURE

¡Bong! If you want to smash through the ceiling to the blue sky, first tear down the WALLS

The End User Security Jigsaw
End user security is about much more than technology level protection. This report looks at the nature of the end user security challenge.
Download now

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.