Remove Computer and Electronics Remove Events Remove Security Remove White Paper
article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Plug a keyboard and mouse into a PS3 and you have a pretty good cloud computing home workstation - we had the session schedule up and running in this format. Hot Topics iPhone iPad Enterprise 2.0 Office 2.0

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Openness | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. The challenges facing Jive’s prospects are well characterized by Sam - locked down, silo’d work methods make it a misery working in a blizzard of electronic paperwork and email.

Paper 40
article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Clearly some proprietary information should be tightly controlled and guarded, and providing satisfactory legal access to events and evidence should be carefully thought through. Hot Topics iPhone iPad Enterprise 2.0

article thumbnail

Security and Privacy Implications of Zoom

Schneier on Security

Over that same period, the company has been exposed for having both lousy privacy and lousy security. In general, Zoom's problems fall into three broad buckets: (1) bad privacy practices, (2) bad security practices, and (3) bad user configurations. Now security: Zoom's security is at best sloppy, and malicious at worst.

Privacy 145