background preloader

Bon à savoir – Google

Bon à savoir – Google
If you’re the tablet owner, touch Settings → Users → Add user or profile. Touch Restricted profile → New profile, then name the profile. Use the ON/OFF switches and settings to manage access to features, settings, and apps. Press the Power button to return to the lock screen, then touch the new profile icon. Once it's all set up, the Home screen is empty. Touch the All Apps icon to get started with the new profile.

https://www.google.com/safetycenter/

Related:  recherche internetכלי גוגלsite WebPRIVACYDesarrollo

Google Search: 10 Questions & Answers to Help You Search Smarter! At the Google Teacher Academy Lisa Thumann awed me with her lively presentation on Google Search. I must do an average of 15 searches a day on a wide range of topics. I search for articles, images, power points presentations, key words, etc. but I had no idea what Google search could do for me and my students. How to Debug Your jQuery Code In the past 10 years, more and more Web development has moved off the server and migrated to the browser, making a user's experience more responsive. Unfortunately, this transition hasn't been very pleasant for developers, given that any attempt to debug client-side code eventually means resorting to the classic JavaScript alert methods, which we are all accustomed to seeing in code such as the following: <script type="text/javascript"> alert('Alerts are so NOT the Bee\'s knees.\n\n' + 'To the contrary, they are the 3 Ds... \n' + '• Difficult to format\n' + '• Disrupt the timing of JavaScript events\n' + '• Disagreeable to the Nth degree!\n\n' + 'In summary, stay away from the alert statement as a debugging tool.'); </script>

You Lookin' At Me? Reflections on Google Glass. - Jan Chipchase - Voices There is but one remedy for the Glass wearer — a bucket of ice water in the face whenever you suspect he has taken you unawares With the public beta launch of Google Glass, there has been a lot of discussion on why it will or won’t fail. The ultimate benchmark for success is high: After someone has tried Glass, can they imagine life without it?

Sweden’s data protection Authority bans Google cloud services over privacy concerns In a landmark ruling, Sweden’s data protection authority (the Swedish Data Inspection Board) this week issued a decision that prohibits the nation’s public sector bodies from using the cloud service Google Apps. A risk assessment by the Board determined that the contract gives Google too much covert discretion over how data can be used The ruling – which bans Google cloud products such as calendar services, email and data processing functions – is based on inadequacies in the Google contract. A risk assessment by the Board determined that the contract gives Google too much covert discretion over how data can be used, and that public sector customers are unable to ensure that data protection rights are protected. The assessment gives several examples of this deficiency, including uncertainty over how data may be mined or processed by Google and lack of knowledge about which subcontractors may be involved in the processing.

Hacks Comunes This page provides information about identifying and removing website badware. It does not cover every situation, only the most common cases we see at StopBadware. Some cases may require further help from a security professional. GoogleAppsPD Wyckoff Google Apps Learning Community On Demand Professional Development This online course provides professional development for Google Apps in an on demand, as needed, ongoing basis. Online training is delivered via the Internet with instructional videos and texts. The course has no start time and no set weekly hours. Use this website to learn what you need to know.

Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new.

Ayuda para webmasters: sitios comprometidos – Google Every day, cybercriminals compromise thousands of websites. Hacks are often invisible to users, yet remain harmful to anyone viewing the page — including the site owner. For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors’ computers, stealing login credentials for online banking or financial transactions. In this first step, we explain how and why hacks happen, and review options for recovery.

Upload the Web Connect Connect your app to everything from Dropbox to Gmail in just 2 lines of code and let the Ink File Picker handle the mess of uploading files - we give you a clean, short URL that is easy to store and read from. See the Docs» filepicker.pick(function(InkBlob){ console.log(InkBlob.url);});

Related:  Google AppsTIECO2013e-safety resourcessecurity