Feeds

Text message speak - txt msg kids

Time 4 T Charlot

The Power of One Brief: Top reasons to choose HP BladeSystem

The time has passed when folk thought it proper to call boys Hubert and girls Gwendolyn. Text messages now dominate our landscape to the extent that boys are more likely to be called Conna and girls named Deby.

Text-speak baby names, according to a report in the Daily Mail, are becoming increasingly common on birth certificates. Several boys have apparently already been named Cam’ron, instead of Cameron, and some girls given the title of Lora, rather than Laura.

Thankfully one couple wasn’t allowed to name their son 4Real, much to Ali G’s disappointment.

Text messaging may also be responsible for inadequate spelling. John Dunford, the general secretary of the Association of School and College Leaders, said some names could be a genuine misspelling or just an attempt by parents to give their kids unique labels.

Once kids are old enough to appreciate their tech-born names, they may quite like them - given that a study by the research and debate quango the Institute for Public Policy Research recently found that children are being increasingly ‘raised’ by technology.

The report stated that any young person, aged between 13 and 18, who spends more than 20 hours per week online is effectively being "raised online". It also found that many kids leave mobile phones on overnight, just in case a text comes through.

Children with text-speak names may find their mobile phone credit lasts longer though, because a text from Jonofn will be slightly shorter than one from Jonathan.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.