We are collecting data for an upcoming blog post, please help us by answering this poll:
[polldaddy poll=5452690]
Poll not showing up in your RSS reader? Follow this link.
There is a follow-up to this poll located here.
Digital Transformation, Industry 4.0, Tesla, maker, and more...
So thanks to an invite from Diane Bjorling (a long time friend on Amplify) I was able to connect to Google+ tonight. I have to say initial response is very positive. In typical Google fashion they did something “different” time will tell if it really hits the sweet spot that will cause it to challenge Facebook. Was great to see a lot of familiar faces and I sent a bunch of invites as well, hope you got one of them in time before it was shut down!
We’ve shut down invite mechanism for the night. Insane demand. We need to do this carefully, and in a controlled way. Thank you all for your interest!For any who wish to leave, please remember you can always exit and take your data with you by using Google Takeout.
It’s your data, your relationships, your identity.
Listen to the panel discussion with Shonali Burke of Shonali Burke Consulting and Gini Dietrich of Arment Dietrich . These two intelligent, fun, humorous and dedicated professionals represent years of experience. Listen in and learn about measurement and some misconceptions. Our conversation also eventually strays to an interesting discussion about Klout and both panelists give their candid opinions on the service.
The era of mobile security has begun officially this February 2011. Some downright outrageous security flaws are being exposed for our growing fleet of mobile electronic devices such as Smart Phones and iPads. For the first time ever we posted two articles about security issues with substantial mobile security implications on our Facebook page:
Either one of those articles by themselves would have huge implications in the security of mobile devices, but the startling thing is that there are others popping up in the last 24 hours as well, and that is what compelled me to write this article for the Managed Solutions blog.
A Chinese localized (targeting Chinese language users) Trojan emerged for the Android platform this week. The Trojan rode onto unsuspecting users via Android App marketplaces and forums.
Threatpost did an amazing job of describing a problem with how Cryptography is implemented on mobile devices. The problem results in the ability to actually capture and mimic the cryptographic key that could be for say your mobile phones payment system. This is particularly important because a lot of people see mobile as having a bright future in the payment arena.
Fraunhofer has a video and press release demonstrating the ability to hack an iPhone and recover passwords in just 6 minutes. You don’t have to be an information security professional to realize that this is not good news for iPhone or iPad users that store anything of sensitive nature on their devices. Here is the video if you’re interested:
Listen to the panel discussion with Chief Richard Price of the San Ramon Valley Fire Protection District, Adriel Hampton of Gov 2.0 Radio and technology blogger Louis Gray. We discussed the latest Fire Department iPhone app (soon to be on other platforms) and it’s gov 2.0, open source and life saving potential.