Search Results:
1-15 of 6708 results

Future cyborg glasses to mimic eye gestures

The new device displays computer-generated eye animations rather than the wearer's real ones.

Mobile & tablets

Published 17 April 2014

Top 5 budget tablets for 2014

Want a tablet on the cheap? Here are the latest and best budget tablets on the market.

Mobile & tablets

Published 17 April 2014

One quarter of SMBs 'don’t have a mobile strategy'

But they rate mobility as important as electricity for their business.

Mobile & tablets

Published 16 April 2014

Tablet and laptop use ‘causing widespread pain’ in young people

40% of 11- to 16-year-olds has suffered some kind of back or neck pain, chiropractor's study finds.

Published 16 April 2014

Motorola UK head steps down following Lenovo acquisition

Morley came to know about Motorola being acquired by Lenovo about 30 minutes prior to the deal.

Mobile & tablets

Published 16 April 2014

Google to integrate micro camera into smart contact lens

The new smart lens could be controlled via a system of unique blinking patterns.

Mobile & tablets

Published 16 April 2014

Samsung Galaxy S5's fingerprint sensor ‘hacked’

White hat hackers used earlier method to parody the Touch ID scanner on the Apple’s iPhone 5S to hack Samsung’s authentication technology.

Mobile & tablets

Published 16 April 2014

Microcamera shows Google Glass will turn into Google contact lens

Camera patents hint at the future of wearable technology.

Mobile & tablets

Published 16 April 2014

Samsung lines up Google Glass killer

Patents reveal Samsung’s Galaxy Glass - an augmented reality Glass rival.

Mobile & tablets

Published 15 April 2014

BTC China launches Bitcoin trading web app for mobile

Picasso ATM will let you sell cryptocurrencies for cash through your phone.

Mobile & tablets

Published 15 April 2014

Samsung Galaxy S5 Zoom gets release date

Will be called Galaxy K, will feature a 20MP camera.

Mobile & tablets

Published 15 April 2014

Q&A: Ex-Facebook CTO Bret Taylor tells us why people will ‘like’ Quip

The inventor of the like button tells CBR about his new collaboration app.

Mobile & tablets

Published 14 April 2014

BBC London investigation reveals mobile phone shops dealing in stolen goods

Corporation films undercover researcher selling fake stolen phones to accused vendors

Mobile & tablets

Published 14 April 2014

Google ‘never copied iPhone features for Android’, Android boss claims

Hiroshi Lockheimer was the latest witness in the ongoing Apple v. Samsung patent-infringement case.

Mobile & tablets

Published 14 April 2014

Top 5 secret features of Windows 8

Dig a little deeper and there's loads to love about Windows 8 and 8.1.

Mobile & tablets

Published 14 April 2014

1-15 of 6708 results

Join our network

715 people like this.
1526 people follow this.

CBR Supplier Recommendations

See more

CBR White Paper Recommendations

  • PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks

    03 November 2010 | By Absolute Software

    Absolute Software*1 and Intel deliver a new level of theft deterrence and data defence through integrated hardware and software technologies for notebook PCs. Computrace,* a leading IT asset-management and security solution from Absolute Software, is taking advantage of Intel® Anti-Theft Technology (Intel AT) 2 which is designed into system hardware. Through Computrace, an authorised information technology (IT) administrator can remotely delete data on a notebook, or the notebook can now intelligently lock itself down and prevent an OS from booting. If the notebook is reported lost or stolen, the IT administrator simply flags it in the Computrace web portal and sets up a "poison pill" so the next time the notebook "phones home", it will be disabled. In both cases, whether the notebook locks itself down or receives a poison pill, and even if the hard drive is reformatted or replaced, anti-theft security options remain in place. Getting the system operational again is easy – authorised users can quickly restore the system with a one-time reactivation token provided by the IT department. IT now has a more reliable, robust approach to protecting assets and minimising financial and/or legal risk from lost or stolen notebooks....

    White Papers
  • The Human Factor in Laptop Encryption: UK Study

    03 November 2010 | By Absolute Software

    Encryption is one of the most important security tools in the defense of information assets. Ponemon Institute has conducted numerous studies on organizations’ use of encryption to prevent the loss of sensitive and confidential information. These studies have shown that encryption can be an effective deterrent. However, our studies also show that in order to be effective, encryption requires organizations and users to take appropriate steps to make sure sensitive and confidential information is protected as much as possible. Download this free white paper to read more....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.