Language Selection

English French German Italian Portuguese Spanish

Google Anything, so Long as It's Not Google

Filed under
Web

IF you were Google's C.E.O., wouldn't you Google yourself? At least once? Would you be surprised to discover that your recent stock sales, net worth, hobbies and contributions to various political candidates are online and easily reached with a click or two?

That your home address pops up so readily - O.K., that may have come as a surprise - shows that a person can no longer designate which piece of personal information becomes public and which remains private.

So why, if you're Eric E. Schmidt, the chairman and chief executive of Google, a soft-spoken person without a history of intemperate action, do you furiously strike at the poor messenger who delivers the news that your company's search service works very well indeed?

Full Story. Free registration may be required.

More in Tux Machines

Intel Compute Stick with Ubuntu Goes on Sale, Lower Specs than Windows Version

The Ubuntu 14.04 LTS flavored Intel Compute Stick is finally going on sale next week, and it joins the Windows version that was already made available a while back. Read more

Ubuntu MATE Project Donates Money to Geany, Transmission, and MATE Devs

The Ubuntu MATE team makes monthly donations to other projects that are being used by this distribution and this month's targets are Geany and Transmission, along with a couple of MATE developers. Read more

Ubuntu MATE hardware partnership with LibreTrend

Ubuntu MATE is an official flavour of Ubuntu focussed on usability and stability, which has gained massive traction in the Linux community over recent months. Inspired by the traditional GNOME 2 interface of classic Ubuntu releases, Ubuntu MATE is the perfect distribution for easing the transition between Microsoft Windows or Mac OS and Linux. Read more

Can Data Infrastructure Vendors Stop Hackers?

The ecosystem is based on Security-Enhanced Linux (SELinux), but it adds role-based access control with a policy for each role, so no one can get to the system root and the root can’t see user data. All access is logged, so any attempts to penetrate the system can be traced. Policies are based on roles such as security admin, audit admin and sysadmin, and each file is tagged with a security level so some users can see it while others can’t. Read more