A surprisingly high percentage of recruiters/hiring managers have rejected employment candidates over posts to the main social media sites. How Recruiters Use Social Networks to Screen Candidates [INFOGRAPHIC] | LinkedIn.
Or the name of any of your contacts. Typical Apple – Siri is personal so it must be teachable. Teach Siri How to Pronounce Your Name.
I’m not surprised by the data I’ve quoted below. The Cloud will definitely be disruptive to existing IT outsource partnerships. It will be fun to see how wins the upcoming battles The survey indicated 77% of firms have started planning Continue reading
News first broke on this camera a few months ago. I’m really anxious to see what it does when in the hands of a “real Joe” photographer. Certainly the interactive images look great. The entry level model is $399 which, Continue reading
The fields are ripe for a major Stuxnet derived disruption. Stuxnet itself had a very narrow target and one that many people felt was justified. Son of Stuxnet will almost surely be considered more costly when it is finally unleashed. Continue reading
Jim Rhoades sussed out a great list of commands Siri recognizes for dictation. Very handy! Kudos to Jim for putting this together and sharing it with us. More Fun With Siri Dictation « Jim Rhoades / Crush Apps.
My faves are the new multitouch gestures and Wifi sync iOS 5 For iPad: 5 Killer Features – – Mobile OS – Informationweek.
So RSA wants to blame a nation-state with no revelation of evidence to support that and also says even though they know the two groups responsible don’t know what nation-state was involved? I can hear the credibility ship sinking… RSA Continue reading
Ars Technica has a post up on the new (free) “Find my Friends” app for iOS 5 – and it is very well done as is their norm. And it shows once again how Apple is taking user privacy Continue reading
Very cool news from my friends at Citrix and Cisco: Cisco Systems Wednesday announced new technology to deliver high-definition video and voice through a virtual desktop infrastructure which sends the signals from one endpoint to the other, bypassing the data Continue reading