Tuesday, December 9, 2014

Data from your wearable could someday be used against you

  UK court to review legality of fast-tracked surveillance law
 
Your Morning Countdown
December 09, 2014 Read about why information collected by activity trackers, smart watches and other wearables could, in theory, be used to put you in - or keep your out of - jail.
10. UK court to review legality of fast-tracked surveillance law

9. Jim Lynch: The best Android phones for the holiday season

8. Top 10 states for tech workers willing to relocate

7. Andy Patrizio: Bluetooth spec updated to improve security for IoT

6. Court sentences ex-Apple manager to 1-year prison term over kickback scheme
WHITE PAPER: Box

Six Essential Elements for A Modern Mobility Strategy
Enterprises that understand the strategic importance of mobility are moving to the head of the pack. With a cohesive mobile strategy that balances secure content sharing, enhanced collaboration, and a superior user experience, a company can ultimately facilitate innovation across the organization.
View now

5. Gigabit speeds over telephone wires get closer thanks to new G.fast standard

4. Uber banned in Delhi after rape by driver

3. Preston Gralla: The HP Stream 13 may be the best value ever in a laptop

2. North Korea denies involvement in 'righteous' Sony hack

1. Data from wearable devices could soon land you in jail
 
WEBCAST: Brocade Communications Systems, Inc

Flash and Fibre: Fulfilling the Promise of VDI
VDI deployment is on the rise and expected to deliver significant operational advantages—but will it? Some VDI projects don't make it past the proof-of-concept stage due to poor performance. Many more fail to deliver tangible benefits because they can't scale to support a wide user base.
View Now>>

Most Popular
15 essential open source tools for Windows admins

Wanted for hire: Engineers with ideas of their own

Cisco's top 10 innovations over the years

How one firm makes beer and basketball better

The CIO's top 3 priorities for 2015

 
: WhiteHat Security, Inc.

Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses.
Learn more >>


 
 

You are currently subscribed to itworld_morning_countdown as garn14.tech@blogger.com.
  Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com
To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

Follow ITworld
Google +
Facebook
Twitter
LinkedIn
 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.