Wednesday, October 1, 2014

12 surprising ways personal technology betrays your privacy

12 surprising ways personal technology betrays your privacy | Moto G (2014): The best smartphone under $200

ITworld Personal Tech

Google Plus LinkedIn Facebook Twitter


Mute tabs with one click in experimental versions of Chrome
If a site is being noisy, this will make it easier to silence it Read More


WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

WHITE PAPER: MobileIron

Top 4 iOS 8 Recommendations for IT Directors
To help IT departments understand how iOS 8 will impact their organizations, this white paper provides recommendations for three key management areas most affected by the new features: security, application development, and content publishing. View now

12 surprising ways personal technology betrays your privacy
It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. Read More

Moto G (2014): The best smartphone under $200
With its no-frills interface and stylish enough chassis, you might as well buy one just to keep in the closet for emergencies. Read More

Game consoles return to China with Xbox One launch
For 14 years the Chinese government banned the manufacture or import of video game consoles. That ended last January and now Microsoft has beat the competition to market. Read More

Hands-off! Gesture-based smartphone control is coming
New technology may soon allow you to control your phone without touching or talking to it Read More


WHITE PAPER: Infoblox

Protecting DNS Infrastructure--Inside and Out
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won't shield your infrastructure from attacks. Learn how to protect your DNS today. Learn more >>

How to map a local folder to a drive letter in Windows
Have you ever wanted to create a drive letter mapping within your local system under Windows? Usually the mappings are reserved for network paths, but it can be useful for development (or even just as a shortcut) to map a local path to a drive letter. Read More

Apple (mostly) not to blame in iPhone 6 Plus 'bendgate' fiasco
If you buy a giant phone, pack it into skinny jeans, sit on it for 18 hours and find that it's bent, Apple's not to blame for the damage. Read More

Get extra Google storage by using Google Maps Views
Check your Google account storage to see if you got this bonus Read More

Former iPhone manager: Apple will struggle to analyze watch data
Inventors, investors, and entrepreneurs gathered for Wearable Wednesday in downtown San Francisco at the offices of Wearable World, an incubator for companies building tech that attaches to various parts of the body. Participants mingled, exchanged war stories, and demoed products at the demo booths lining the room. Read More


DON'T MISS...

Head-scratchers: 10 confounding programming language features

Top 25 free tools for every Windows desktop

15 simple, secret Windows tips and tricks to save you time

Superclass: 14 of the world's best living programmers

The 10 best laptops of 2014 (so far)

ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_personal_tech as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.