-
No password required, no need to plug it in.
NPR: Books for Children, Books for Life
-
Is lock and password-protection required, and how is it managed?
FORBES: "I Want My iPad": Avoiding IT Consumerization Pitfalls
-
No wireless LAN access point or complicated ID or password entry is required, and once pictures have been downloaded to the smartphone, it is simple to upload them to social networking sites.
ENGADGET: Fujifilm launches alphabet soup of point-and-shoot, compact and bridge cameras
-
At the time, people were unfamiliar with the concept of a computer password, which required structuring a scene early in the film in which the main character, played by Matthew Broderick, sneaks into his high-school principal's office to check out a piece of paper showing a list of random words.
WSJ: "Disconnect": From Talkies to Texties
-
Strict security measures at the Postal Service required regular password changes and forced users to select nonobvious passwords, which are harder to remember.
FORBES: Escaping Password Purgatory
-
After the software release all in-app transactions required a password.
BBC: Treasure Story
-
It will involve choosing a username and password, that will be required each time you sign in.
BBC: Preview: A History of the World shows Norfolk treasures
-
But more than 10, 000 Web sites now recognize a service called Facebook Connect, which enables users to use their Facebook ID and password to move fluidly among sites where registration is required.
FORBES: Facebook: A privacy round-up
-
To try the service, today I registered myself, which took about 10 seconds and required refreshingly little personal info (just a name, email, and password of my choosing).
FORBES: Get Paid to Eat Out!
-
Apple hasn't been as direct about what's going on, but Wired believes there's been a 24-hour hold on phone-based Apple ID password resets while the company marshals its resources and decides how much extra strictness is required.
ENGADGET: Amazon, Apple stop taking key account changes over the phone after identity breach