Monday, May 5, 2014

The best IFTTT recipes for Android (so far)

The best IFTTT recipes for Android (so far) | Mobile security tools win over IT pros

ITworld Personal Tech

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


1988 Video Privacy Protection Act rises up and bites Hulu
Once again a law intended to protect your VHS rental history is being used to squeeze a streaming company. Read More


WHITE PAPER: CA Technologies

Simplifying Data Protection, Reducing Risk of Data Loss
This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection, availability and alignment with business goals, as well as cost. Learn more!

WEBCAST: Polycom

Beyond IM & Presence: When IT Gets it Right
Steve Blood, Research Vice President at Gartner, Inc., discusses how Unified Communications (UC) helps employees collaborate in real time and facilitates better decisions, and Polycom CIO Rich Decker outlines the keys for IT teams to "get it right" from the get-go when it comes to Lync deployment. Learn more >>

The best IFTTT recipes for Android (so far)
I have dug deep through IFTTT's shared recipes and other nerdy parts of the web to return with the most useful Android-ready setups. Read More

Mobile security tools win over IT pros
When we asked about tech favorites, several IT pros cited tools they've acquired to help address mobile device management, data security and application control. Read More

Samsung wants to talk about your health at event on May 28
Samsung Electronics has sent out invitations to a May 28 event in San Francisco, at which the company is expected to expand its health-related offerings Read More

The Internet of Things likely to drive an upheaval for security
The Internet of Things is likely to bring 'a major inflection point in security' sooner than you think. Read More


WHITE PAPER: Riverbed Technology

Case Study - MTC Australia
In moving to a "cloud first" approach for their business-critical apps, they were able to remedy the increased network traffic with Riverbed solutions to ensure a positive user experience. View now>>

Australian customs seizes fake iPhones that deliver a shock
Australia's customs service seized on Thursday more than 6,000 weapons that arrived in the country from China, including a batch of fake iPhones that deliver electric shocks. Read More

Google deals made Android phones more expensive, lawsuit claims
A lawsuit filed Thursday accuses Google of strong-arming device manufacturers into making its search engine the default on Android devices, driving up the cost of those devices and hurting consumers. Read More

Robocoin ATMs will send bitcoins to phone numbers
Leading Bitcoin ATM manufacturer Robocoin is upgrading its network of machines with bank-style features, including the ability to send funds to phone numbers. Read More

So that's what happened to Clippy [CARTOON]
Excavators found those long buried E.T. Atari 2600 game cartridges, but perhaps some other famous tech blunders should remain buried Read More


SURVEY:

Take ITworld's mobile survey and you might win an iPad mini
Got 10 minutes? Tell us how you use your mobile device to view and share technology-related content and information. As our way of saying thank you, readers who participate will be entered in a drawing for a chance to win an iPad mini. Take the survey now!

BOOK GIVEAWAY:

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter today for your chance to win!

Penetration Testing: A Hands-On Introduction to Hacking
In "Penetration Testing," security researcher Georgia Weidman provides a survey of important skills that any aspiring pentester needs. Enter now!

jQuery and JavaScript Phrasebook
Get more done faster with jQuery and JavaScript! Brad Dayley's jQuery and JavaScript Phrasebook brings together 100+ instantly useful code snippets and idioms for performing a wide spectrum of common web application tasks. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_personal_tech as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.