Feeds

Teens use technology to party in strangers' pools

Google Earth and Facebook spawn pool-crashing craze

The Power of One Brief: Top reasons to choose HP BladeSystem

Tech savvy teens are using Google Earth’s splendidly clear aerial shots of the UK to launch a summertime craze – pool crashing.

Swimming pool on Google Earth

<Google Earth’s used to identify pool-equipped victims and then Facebook helps organise the crash

Teens begin by surfing Google Earth’s satellite images to find houses with swimming pools — or at least paddling pools. Once a target has been identified, sweaty swimmers then use Facebook to arrange an organised, but uninvited, pool-crash.

A spokesman for Devon and Cornwall Police has already told the Daily Mail that owners of swimming pools should be on their guard. The spokesman reminded any pre-pubescent readers already reaching for the Google Earth icon that “using someone else’s pool is trespassing and therefore illegal”.

Owners of several plush poolside properties have already returned home to find teenagers taking a dip in their man-made lakes or their spoor: beer cans, dog-ends and vomit floating atop their once crystal-clear pools.

Mobile phones, of course, seem to be an invaluable tool for a good pool-crash. Apparently, mobile numbers were doled out on Facebook for the organisers of one such event held earlier this week between midnight and 3am – well, it was a school night…

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.