Feeds

Speaking in Tech: Finally a PROPER use for drones: TOILET PAPERING your house

Plus: 'I just want ONE remote for TV. Please!'

The Power of One Brief: Top reasons to choose HP BladeSystem

Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

It's another episode of El Reg's techcast, hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Eddie and Sarah have bailed on the show so Greg is joined by Cisco's Amy Lewis to chew on the tech news of the week and to dig into Amy's work history.

This week we discuss...

  • Podcasting in Pumps (3:17)
  • Sucked into UberConference (4:31)
  • US to give up naming the web (7:10)
  • Amazon Prime price hike and shameless toilet paper (11:20)
  • Grocery shopping on Amazon (19:00)
  • Peeling Camel Cash (20:00)
  • Greg and Amy's worst jobs (21:15)
  • Google on fire with Play Movies and Chromecast going global (26:10)
  • Android gets wearable (30:35)
  • Google mangles Hangouts while Voice is headed for the trash can (33:10)
  • Is that a prescription drug or a startup? (42:35)
  • QuizUp App and fuzzy logic (43:15)
  • Engineers unplugged (46:00)

Listen with the Reg player below, or download here.

Speaking in Tech: Episode

Podcast Subscriber Links

Subscribe through iTunes
Subscribe through Google
Subscribe through Stitcher

Feed URL for other podcast tools – Juice, Zune, et cetera: http://nekkidtech.libsyn.com/rss

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.