Laura, a tattoo artist in Pennsylvania, was in a computer training class when she decided to check her e-mail.
"Halfway through [my] reading a scandalous e-mail from a then-boyfriend, someone said, 'Um ... you probably want to get off of that,'" she writes. "I forgot that the computer I was using was the 'sample' screen broadcast in front of the whole audience."
Jennifer, a PR associate in California, says she was giving a presentation during a meeting when her Outlook e-mail kept appearing on screen.
"At the time, I was dating this guy that kept calling me Babydoll," she says. "He sent me an e-mail saying, 'Hi Babydoll, last night was great ;-)'"
How to avoid having this happen to you: Unless you absolutely need to go online during your dog-and-pony show, disconnect from the Net first, Babydoll.
Tech embarrassment No. 9: Photo no-no's
The embarrassing online photo is such a staple of the Internet Age that we dedicated an entire story to it earlier this fall. Even then we missed a few good ones from people who really should know better. If these guys aren't embarrassed, they should be.
Like Sergey Brin in drag, for example. As a Stanford undergrad, the Google co-founder apparently liked to explore his feminine side.
Meanwhile, tech blogger Robert Scoble makes Pirillo look like Brad Pitt with this PR photo for his Naked Conversations book, substituting a laptop for a big pair of mitts. We think Bob needs a bigger computer -- much, much bigger.
(Thanks to former Valleywagger Nick Douglas for digging these up in the first place.)
How to avoid having this happen to you: 1. Learn how to use Photoshop. 2. For pics that escaped in your carefree college days before you sobered up and got a real job, services such as Reputation Defender will search for and destroy them for a fee.
Tech embarrassment No. 10: Twitterhead
Twitter and other microblogs have inspired folks to share everything. And we mean everything. If you can say it in 140 characters or less, it's guaranteed somebody has said it on Twitter.
Here are tweets from five different Twitterati found via search.twitter.com. These people should be embarrassed, but probably aren't.
--One of us is puking, one has diarrhea, one has tension headaches and one has a sore throat and congestion. Playdate, anyone?
--Parasites, Parasites, Parasites. Where else can you find such words as "diarrhea," "megacolon," and "frothy vaginal discharge" together?
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts