Feeds

Google Latitude maps way onto iPhone

Smartphone-based stalking made easier

Choosing a cloud hosting partner with confidence

Would-be spies or stalkers can now use the iPhone to track down cheating partners or roving friends, following Google’s launch of its Latitude location-based service (LBS) for the Apple smartphone.

You won’t be able to download Latitude as an application through iTunes, though. Google said that “Apple requested we release Latitude as a web application in order to avoid confusion with Maps on the iPhone”.

The net result is that you must access Latitude through the Safari browser on your iPhone. Latitude is also now compatible with the iPod Touch, Google added.

It’s worth noting that Latitude is only compatible with version 3.0, and above, of the iPhone firmware. The LBS is also restricted to use within the UK, North America, Canada, Australia and New Zealand - so updating your location while sitting on a Tunisian beach isn’t yet possible.

Since the iPhone doesn’t allow applications or browser-based applications to run in the background, your Latitude location will only be updated each time you fire up the service through Safari.

Further details about how to get Google Latitude working on your iPhone or iPod Touch are available online now. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.