Mobile Security For Android
Whisper Systems provides security and management solutions that transform consumer phones and tablets into enterprise-ready devices.
via Whisper Systems.
Twitter acquired this company and open sourced its software.
Mobile Security For Android
Whisper Systems provides security and management solutions that transform consumer phones and tablets into enterprise-ready devices.
via Whisper Systems.
Twitter acquired this company and open sourced its software.
According to new research from HTTP Archive, which regularly scans the internet’s most popular destinations, the average size of a single web page is now 965 kilobytes (KB), up more than 30% from last year’s average of 702KB.
via The web in 2011: HTML5 dominates Flash, trouble for data capped mobile surfers | ExtremeTech.
There are five broad categories of “bad things” that running software could do, for the purposes of our discussion. In no particular order, software can attempt to damage the machine, compromise the user’s privacy, damage the user’s information, do “bad things” to people other than the machine’s user, and lastly, impersonate the user.
via OLPC Bitfrost – OLPC.
To demonstrate this we’ve built an app which requires no permissions and yet is able to give an attacker a remote shell and allow them to execute commands on the device remotely from anywhere in the world.
via No-permission Android App Gives Remote Shell – viaForensics « viaForensics.
Here is a paper.
An MIT Magic Trick: Computing On Encrypted Databases Without Ever Decrypting Them – Forbes.
Now the Google- and Citigroup-funded work of three MIT scientists holds the promise of solving that long-nagging issue in some of the computing world’s most common applications. CryptDB, a piece of database software the researchers presented in a paper (PDF here) at the Symposium on Operating System Principles in October, allows users to send queries to an encrypted set of data and get almost any answer they need from it without ever decrypting the stored information, a trick that keeps the info safe from hackers, accidental loss and even snooping administrators. And while it’s not the first system to offer that kind of magically flexible cryptography, it may be the first practical one, taking a fraction of a second to produce an answer where other systems that perform the same encrypted functions would require thousands of years.
AnandTech – Gallery – Antec Eleven Hundred – 6 Photos.
Hardware porn. I think Microcenter sells this case.
To get rich in the world of cloud computing, you first need to focus on a skill that’s in high demand, which is the kind that will pay very well. Second, work for an organization that provides some return on equity around the use of those skills. Typically, that means a hot technology startup or perhaps a small publicly traded technology company that’s now moving to the cloud. Wait a few years, sell your stock, move to beach, then repeat.
via How to get rich in the cloud | Cloud Computing – InfoWorld.
And that’s all it takes. 🙂
Dell introduced the Dell Inspiron Mini 9 in 2008. It included an Intel Atom N270 processor, solid-state storage and an 8.9-inch 22.6-cm screen. A second generation, the Dell Inspiron Mini 10, was built using the Atom Z520 or Atom Z530 processors
Google’s Android Update Alliance Is Already Dead | Jamie Lendino | PCMag.com.
What’s the point of upgrading the OS on a phone that will obsolete in a year or so?