Skip to Content

2012 June

June 29, 2012

Google helps train developers, hook up universities in new education programs


Google Docs gets new Research tool, lets you search without leaving your work


June 27, 2012

Become a Google power searcher


June 25, 2012

Free Digital Textbooks Funded Through Advertising


June 14, 2012

Noam Chomsky insists that email was invented in 1978 by 14-year-old

Statements from Noam Chomsky:

Email, upper case, lower case, any case, is the electronic version of the interoffice, inter-organizational mail system, the email we all experience today — and email was invented in 1978 by a 14-year-old working in Newark, NJ. The facts are indisputable.

Read more by The Inventor of Email..

Opera 12 for the desktop goes live with camera support, browser themes


June 13, 2012

WordPress Workshop offered by CASIT for CAS Staff

July 2nd 12:00pm to 1:00pm, SSIL Lab McKenzie 445.

WordPress is a powerful website content management system. It currently is running behind many CAS department and program websites. Free WordPress sites and blogs are also available to faculty, staff and students via

June 6, 2012

Security warnings for suspected state-sponsored attacks

Google: We are constantly on the lookout for malicious activity on our systems, in particular attempts by third parties to log into users’ accounts unauthorized. When we have specific intelligence—either directly from users or from our own monitoring efforts—we show clear warning signs and put in place extra roadblocks to thwart these bad actors.

Today, we’re taking that a step further for a subset of our users, who we believe may be the target of state-sponsored attacks. You can see what this new warning looks like here:


Google unveils full 3D Google Earth feature

Google uses advanced 3D imaging to create full 3D maps, which will come soon to Android and iOS.


June 4, 2012

Apple: Guide To iOS Security

System Architecture
Secure Boot Chain
System Software Personalization
App Code Signing
Runtime Process Security
Encryption and Data Protection
Hardware Security Features
File Data Protection
Keychain Data Protection
Network Security
Device Access
Passcode Protection
Configuration Enforcement
Mobile Device Management
Device Restrictions
Remote Wipe
A Commitment to Security

Download the guide from the Apple website.