Feeds

Google Latitude maps way onto iPhone

Smartphone-based stalking made easier

The Power of One Brief: Top reasons to choose HP BladeSystem

Would-be spies or stalkers can now use the iPhone to track down cheating partners or roving friends, following Google’s launch of its Latitude location-based service (LBS) for the Apple smartphone.

You won’t be able to download Latitude as an application through iTunes, though. Google said that “Apple requested we release Latitude as a web application in order to avoid confusion with Maps on the iPhone”.

The net result is that you must access Latitude through the Safari browser on your iPhone. Latitude is also now compatible with the iPod Touch, Google added.

It’s worth noting that Latitude is only compatible with version 3.0, and above, of the iPhone firmware. The LBS is also restricted to use within the UK, North America, Canada, Australia and New Zealand - so updating your location while sitting on a Tunisian beach isn’t yet possible.

Since the iPhone doesn’t allow applications or browser-based applications to run in the background, your Latitude location will only be updated each time you fire up the service through Safari.

Further details about how to get Google Latitude working on your iPhone or iPod Touch are available online now. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.