Laura, a tattoo artist in Pennsylvania, was in a computer training class when she decided to check her e-mail.
"Halfway through [my] reading a scandalous e-mail from a then-boyfriend, someone said, 'Um ... you probably want to get off of that,'" she writes. "I forgot that the computer I was using was the 'sample' screen broadcast in front of the whole audience."
Jennifer, a PR associate in California, says she was giving a presentation during a meeting when her Outlook e-mail kept appearing on screen.
"At the time, I was dating this guy that kept calling me Babydoll," she says. "He sent me an e-mail saying, 'Hi Babydoll, last night was great ;-)'"
How to avoid having this happen to you: Unless you absolutely need to go online during your dog-and-pony show, disconnect from the Net first, Babydoll.
Tech embarrassment No. 9: Photo no-no's
The embarrassing online photo is such a staple of the Internet Age that we dedicated an entire story to it earlier this fall. Even then we missed a few good ones from people who really should know better. If these guys aren't embarrassed, they should be.
Like Sergey Brin in drag, for example. As a Stanford undergrad, the Google co-founder apparently liked to explore his feminine side.
Meanwhile, tech blogger Robert Scoble makes Pirillo look like Brad Pitt with this PR photo for his Naked Conversations book, substituting a laptop for a big pair of mitts. We think Bob needs a bigger computer -- much, much bigger.
(Thanks to former Valleywagger Nick Douglas for digging these up in the first place.)
How to avoid having this happen to you: 1. Learn how to use Photoshop. 2. For pics that escaped in your carefree college days before you sobered up and got a real job, services such as Reputation Defender will search for and destroy them for a fee.
Tech embarrassment No. 10: Twitterhead
Twitter and other microblogs have inspired folks to share everything. And we mean everything. If you can say it in 140 characters or less, it's guaranteed somebody has said it on Twitter.
Here are tweets from five different Twitterati found via search.twitter.com. These people should be embarrassed, but probably aren't.
--One of us is puking, one has diarrhea, one has tension headaches and one has a sore throat and congestion. Playdate, anyone?
--Parasites, Parasites, Parasites. Where else can you find such words as "diarrhea," "megacolon," and "frothy vaginal discharge" together?
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts