Search Results:
1-15 of 2093 results

BTC China launches Bitcoin trading web app for mobile

Picasso ATM will let you sell cryptocurrencies for cash through your phone.

Mobile & tablets

Published 15 April 2014

10 things we miss about technology from the Noughties

Four years is a long time in the technological world.

Published 09 April 2014

How Nottingham Trent University has bolstered its wireless defences

The university has teamed up with a provider of pervasive network security solutions.

Mobile & tablets

Published 04 April 2014

Bupa web presence kept in good health by web domain name company

The launch of new gTLDs represented a big online challenge for the healthcare firm.

Mobile & tablets

Published 04 April 2014

How to invest in voice-enabled technology

Darrel Williams, EMEA regional director of voice technology solutions provider, Vocollect, teams up with CBR to give his five top tips to help...

Mobile & tablets

Published 01 April 2014

Top 5 video conferencing apps

Want to keep in touch with colleagues, friends and family? These videoconferencing apps make is really easy.

Mobile & tablets

Published 19 March 2014

470-year-old school modernises with wireless solution

Meru WiFi provides the “glue” for education technology across multiple historical and modern sites

Mobile & tablets

Published 11 March 2014

Canterbury Cathedral stops its WiFi users from downloading porn

The Cathedral has action following recent reports that public WiFi is commonly being used to access x-rated content.

Mobile & tablets

Published 10 March 2014

Drones vs Loons: The battle for mobile internet supremacy

Will Facebook’s drones and Google’s helium Wi-Fi balloons stick, or are they just a load of hot air?

Mobile & tablets

Published 04 March 2014

Mobile roaming to be worth $90bn by 2018

But ‘silent roamers’ cost the mobile industry billions each year.

Mobile & tablets

Published 04 March 2014

Careful, your mobile could sell you a car

Mobile adverts are influencing what people buy more than ever.

Mobile & tablets

Published 24 February 2014

Virgin Media chooses Wi-Fi network from Devicescape

Smartphone users will have access to Wi-Fi hotspots wherever they are.

Mobile & tablets

Published 20 February 2014

Can text messages improve the NHS and patient care?

Hospitals are using SMS to transform patient communication and tackle inefficiency.

Mobile & tablets

Published 17 February 2014

From rom-coms to rom-telecoms

How technology could change romantic films...

Mobile & tablets

Published 14 February 2014

Connected cars set to be introduced on European roads

CEN and ETSI deliver first set of standards for Cooperative Intelligent Transport Systems.

Networking

Published 14 February 2014

1-15 of 2093 results

Join our network

716 people like this.
1535 people follow this.

CBR Supplier Recommendations

See more

CBR White Paper Recommendations

  • PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks

    03 November 2010 | By Absolute Software

    Absolute Software*1 and Intel deliver a new level of theft deterrence and data defence through integrated hardware and software technologies for notebook PCs. Computrace,* a leading IT asset-management and security solution from Absolute Software, is taking advantage of Intel® Anti-Theft Technology (Intel AT) 2 which is designed into system hardware. Through Computrace, an authorised information technology (IT) administrator can remotely delete data on a notebook, or the notebook can now intelligently lock itself down and prevent an OS from booting. If the notebook is reported lost or stolen, the IT administrator simply flags it in the Computrace web portal and sets up a "poison pill" so the next time the notebook "phones home", it will be disabled. In both cases, whether the notebook locks itself down or receives a poison pill, and even if the hard drive is reformatted or replaced, anti-theft security options remain in place. Getting the system operational again is easy – authorised users can quickly restore the system with a one-time reactivation token provided by the IT department. IT now has a more reliable, robust approach to protecting assets and minimising financial and/or legal risk from lost or stolen notebooks....

    White Papers
  • The Human Factor in Laptop Encryption: UK Study

    03 November 2010 | By Absolute Software

    Encryption is one of the most important security tools in the defense of information assets. Ponemon Institute has conducted numerous studies on organizations’ use of encryption to prevent the loss of sensitive and confidential information. These studies have shown that encryption can be an effective deterrent. However, our studies also show that in order to be effective, encryption requires organizations and users to take appropriate steps to make sure sensitive and confidential information is protected as much as possible. Download this free white paper to read more....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.