• HP's printer division recently began a remote-conferencing and document-sharing service called Halo, which has 15 corporate customers.

    FORBES: Magazine Article

  • But Monday's post on document-sharing site Pastebin refers readers to a Twitter feed considered a reliable source of Anonymous information.

    CNN: FBI denies claims of Apple ID hack

  • His team has already created a prototype of a document-sharing service that will be released to employees by the end of year.

    FORBES: Connecting marketers to the Forbes audience. What is this?

  • Google has made its Apps business--its online calendar, e-mail, document sharing and other services--compliant for government use, a move the company hopes will help direct sales to the world's largest information technology business and improve its profile with private-sector corporate customers.

    FORBES: Magazine Article

  • To qualify for the program, countries must meet strict security criteria, such as information-sharing agreements, travel document standards and law enforcement cooperation.

    FORBES: Destination: USA

  • So this time around, we invited our audience to document the inauguration through Instagram, the mobile photo-sharing site that was launched in October 2010 and now boasts an impressive 90 million monthly active users.

    CNN: What Instagram taught us about the inauguration

  • That package includes online e-mail, word processing, spreadsheets and document sharing, much like Microsoft's cash cow Office suite.

    FORBES: Google Digs Deeper Into Business

  • If you're so down to document your concert-going experience, might we suggest downloading video-sharing app Viddy rather than using your phone's native camera?

    CNN: Technology and concerts: What not to do

  • The authors document HP's pioneering willingness to embrace profit sharing, flexible work hours and self-chosen projects.

    FORBES: Book Review

  • Failure to properly log off, unwittingly emailing a confidential document, using a thumb drive to bring work home, peer-to-peer file sharing, and other routine tasks that inadvertently create risks of exposing sensitive data to theft or misappropriation are not usually the results of malice.

    FORBES: The Evil Twin: Learning From Insider Security Threats

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定