Remove tag ed-tech
Remove 2010 Remove Government Remove Security
article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Microsoft Office Green tech Smart phones Collaboration 2.0 Dev Connection A Developers View Digital Cameras & Camcorders Ed Botts Microsoft Report Emerging Tech Enterprise Web 2.0

Paper 40
article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Microsoft Office Green tech Smart phones Collaboration 2.0 In some ways ESME is more advanced than Twitter since it features user groups and tag clouds, enabling project based contextual messaging. dahowlett@.

Paper 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Microsoft Office Green tech Smart phones Collaboration 2.0 Dev Connection A Developers View Digital Cameras & Camcorders Ed Botts Microsoft Report Emerging Tech Enterprise Web 2.0

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Microsoft Office Green tech Smart phones Collaboration 2.0 10 SharePoint deployment challenges Will Sharepoint 2010 work with Sharepoint 2007? Hot Topics iPhone iPad Enterprise 2.0

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's not the only such claim either; earlier last year in the wake of another security controversy, another similarly spectacular claim was made : In public, UIDAI claimed Aadhaar was completely secure.

Security 111
article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Microsoft Office Green tech Smart phones Collaboration 2.0 Weve actually resorted to putting name tags on the inisde of our childrens shirts. Hot Topics iPhone iPad Enterprise 2.0 which actually work.

article thumbnail

Autonomy CEO: Web 2.0 'under all the hype, there is something there.' | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Microsoft Office Green tech Smart phones Collaboration 2.0 The problem is universal to all enterprises, regardless of industry or private/government, and virtually every business unit within those organizations.

Paper 40