dcsimg

Microsoft to Disable or Remove Phone ID Software Built Into Their Windows Phone 7 Mobile OS

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


With Standing room only at this weeks US Senate hearing on the privacy being afforded to those who choose to live with a smartphone at their side 24/7, Microsoft made a commitment to stop IDing mobile devices running the Windows Phone 7 Operating System. Obviously this will mean another WP7 update in the near future thus disabling the on-board location-tracking services on the OS or rendering them inert. All this, clearly a jab at both Apple's iOS and Google's Android OS who's authors have yet to provide the same move forward to protecting our write to privacy.

In a historic announcement, Microsoft actually agrees to make efforts to protect our basic human right to privacy, Google and Apple have yet to act responsibly with our freedom.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity.

  • Mobility is reaching an inflection point in enterprise. Smart enterprises are moving away from tactical point solutions for mobile device management, looking instead for a secure, comprehensive, unified, and future-proof mobile-app platform. Enterprise applications are now at the heart of mobile productivity, data is shared outside the enterprise walls, and the data itself may reside on multiple devices and clouds. Read this guide to learn how a unified endpoint management (UEM) solution is critical to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.