IBM may have adopted a “bring your own device” strategy for its employees back in 2010, but judging from an interview with the company’s chief information officer, you won’t be able to actually do much with them while there.
There are only a few apps we’d want to take with us on a desert island, but one of them is 1Password, the acclaimed cross-platform login and password manager for desktop and mobile devices. Now, security expert Norton has decided to challenge the best with its new Identity Safe.
New parents: Drop those poopy diapers and head to the Mac App Store, immediately! (Or, you know, when you’re done cleaning up.) The best-selling Anne Geddes baby record book My First Five Years has now been converted to a Mac app and it looks pretty amazing. Don’t have a kid? Then gift it to someone who does! About the only way this could be even better is if they make it available for the iPad (hint, hint). While you ponder that, read on to find out what else is making news for this Thursday, April 12, 2012.
I’ve never been too paranoid about privacy. I use a club card in the grocery store, fully aware that my purchase habits are being tracked--but I don’t care if I can save a dollar on cereal. My car flies through the tollbooths at the Bay Area bridges thanks to my FasTrak device, which I guess could be used to track my movements if I ever murdered someone. Don’t worry; I’m not planning to--it’s just that I remember that happening on Law & Order once.
We all know what happened when that iPhone 4 prototype got left in a Silicon Valley bar. A journalist’s house got raided, two guys got a year of probation, and an Apple employee ended up with a lot of ’splainin’ to do. The whole situation could have been avoided if Apple had used Kensington’s BungeeAir case.
Configuring firewalls can be frustrating, especially if you have to manually add applications, port numbers, or IP addresses that can pass through. Fortunately, applications like IceFloor that help simplify this process. This free Mac App allows you to enable and disable services, applications, and hardware with ease, and with its advanced mode, you can also manually block specific port numbers. Read on to learn how to use this impeccable tool.
With all of the privacy concerns swirling around our digital lives these days, it’s no wonder that an entire cottage industry is beginning to crop up to help empower users into taking back control of their virtual lives. Gliph is the latest app to challenge that lofty goal.
Whether you use your iPad 2 for work or play, the last thing you want to worry about is the possibility that someone might snatch up your tablet. With the sleek Kensington SecureBack Security Case, you can tether your iPad 2 to the nearest table leg or other sturdy object to thwart potential thieves. The case is equipped with a ClickSafe lock to keep your Apple tablet secure, and it has a useful stand that allows you to still prop up your device while it’s locked down.
If you’re working with sensitive files such as confidential work documents on your iPhone, iPad or iPod touch, it’s important to protect your data should you misplace your device. The first thing to do is make sure you’ve got a passcode lock set. Do this in Settings > General > Passcode Lock. This will prevent immediate access to your device.
Before we get started, we'd do well by advising you not to leave your Mac unattended in a public place. That's an expensive -- and highly coveted -- machine! But sometimes, nature calls, or that second latte is all you need to keep chugging along with work for the afternoon. Take the neccessary precautions to make sure that your laptop stays put and, more importantly, that your private information stays unrevealed.