Quantcast
Channel: Connected Social Media » privacy
Browsing latest articles
Browse All 17 View Live

Image may be NSFW.
Clik here to view.

What’s All This Twittering About?

Biz Stone, Co-Founder of Twitter talks about the social networking and micro-blogging service’s runaway success, and how marketers can leverage this new tool. Speaking to Jennifer Jones, Biz describes...

View Article



Image may be NSFW.
Clik here to view.

Google’s deputy general counsel Nicole Wong talks about privacy

Nicole Wong, Google’s deputy general counsel in charge of compliance, is the point person for growing criticism of Google’s privacy practices. More than two dozen European privacy regulators have...

View Article

Image may be NSFW.
Clik here to view.

Is Data Privacy the Next Electronic Border?

Join BearingPoint managing director Warren Zafrin to explore how the Internet’s ability to allow information to flow freely between countries has become the electronic border that will expand or...

View Article

Image may be NSFW.
Clik here to view.

Future Lab: Protecting Privacy, Making the Invisible Visible

A seamless and ubiquitous computing experience on the Internet also requires the user to take on a certain amount of risk that personal information would get into the wrong hands. Computer scientists...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system...

View Article


Image may be NSFW.
Clik here to view.

Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

In this episode of The Tomorrow Project: Science Fiction author, Cory Doctorow and Intel Futurist, Brian David Johnson discuss Cory’s “Knights of the Rainbow Table” story included in the new “Tomorrow...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: Protecting the Perimeter

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving...

View Article


Image may be NSFW.
Clik here to view.

SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both. For more information, see: intel.com/TMI

View Article


Image may be NSFW.
Clik here to view.

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design,...

View Article

Image may be NSFW.
Clik here to view.

The Cloud, Wearables, and Privacy…Oh My! – Intel Chip Chat – Episode 274

In this Intel Chip Chat audio podcast with Allyson Klein: Ben Kepes, the founder of Diversity Limited and Reuven Cohen, chief cloud advocate at Citrix join the IDF livecast for a wide-ranging...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other....

View Article

Image may be NSFW.
Clik here to view.

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security...

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his...

View Article


Image may be NSFW.
Clik here to view.

IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed...

View Article


Image may be NSFW.
Clik here to view.

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a...

View Article

Image may be NSFW.
Clik here to view.

Big Data: Rethink Privacy

IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting...

View Article

Browsing latest articles
Browse All 17 View Live




Latest Images