DataCenterNews Asia Pacific - Specialist news for cloud & data center decision-makers

Laptops stories - Page 42

Toy

Sex toys and cyber crims, oh my

Wed, 16th Mar 2016
#
cybersecurity
#
trend micro
#
tablets
At a news conference, security firm Trend Micro demonstrated how a smart sex toy could be easily hacked and controlled.
Business solution

IT departments need to up their unified solutions game

Tue, 15th Mar 2016
#
endpoint protection
#
edr
#
cybersecurity
New study reveals IT departments must bolster unified security strategies amid growing endpoint and patching challenges.
Eye data

The four largest threats to your data

Tue, 15th Mar 2016
#
dr
#
cloud services
#
opinion
The warnings about your data are everywhere, but have you ever stopped to think what you're protecting your data from?.
Cart

Mobile payments get easier with new Visa product

Mon, 14th Mar 2016
#
martech
#
commerce systems
#
supply chain
Visa lauches digital swipe product enabling shoppers to complete online purchases by sliding a virtual image of their credit, debit or prepaid card.
Digital world

Analyst Opinion: Coming to a device near you – the enterprise digital workplace

Fri, 11th Mar 2016
#
cx
#
martech
#
byod
Persistent and rewarding customer experiences are designed, delivered, and managed using enterprise software and line-of-business applications.
Doodles bae

Passwords are so last year. Today, it's all about the doodles

Fri, 11th Mar 2016
#
endpoint protection
#
edr
#
passwords
In the future, free-form gestures, such as a doodle or signature, may be used in place of passwords to keep mobile devices secure.
Tablet security

Got an Android device? Here's some tips for keeping it secure

Thu, 10th Mar 2016
#
malware
#
cybersecurity
#
operating systems
As Android malware surges, ESET issues some tips on how Kiwis can protect themselves - and how to know if you might have been compromised already.
Wearable

Unmanaged wearables pose threat to the enterprise

Tue, 8th Mar 2016
#
wearables
#
physical security
#
centrify
Wearable device owners in the enterprise are neglecting login credentials, posing a growing IT security concern, warns Centrify RSA Survey.
Confused

Govt's data breach bill will unleash confusion, says expert

Mon, 7th Mar 2016
#
breach prevention
#
cybersecurity
#
data breach
Australian organisations will struggle to comply with the Federal Government's mandatory data breach notification proposals.
Disaster recovery button

What is Disaster Recovery and why should your business have it?

Thu, 3rd Mar 2016
#
dr
#
dlp
#
cloud services
20 years ago, disaster was usually delivered by Mother Nature as survival of the business depended on bricks and mortar. Today, that's all changed.
Surface book

Hands-on Review: Microsoft Surface Book

Thu, 3rd Mar 2016
#
gaming
#
digital entertainment
#
microsoft
Microsoft's Surface Book is a sleek, responsive and intuitive, albeit slightly expensive, laptop/tablet hybrid.
Ipad

SPCA Auckland goes digital

Tue, 1st Mar 2016
#
data analytics
#
martech
#
cdp
SPCA and tech firm Fronde partner to streamline pet adoptions with a custom-built app, replacing paper-based system.
Byod blue background

Going mobile: How to have secure file-sharing, backup recovery and access

Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
530

Free Wi-Fi at Northland DHB hospitals

Tue, 1st Mar 2016
#
wireless networks
#
cloud services
#
wifi
The objective is to make the hospital experience more pleasant by enabling patients to maintain communication with family and business contacts.
Students

Student information software in hot demand

Mon, 29th Feb 2016
#
edutech
#
uc
#
cloud services
Student information systems are being more readily adopted by schools, thanks largely to advancements in cloud computing and the growth of mobiles.
Eye data drawing

Endpoint data protection: A buyer's checklist

Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Rock it girl

Technology: It's not just for youngsters

Mon, 29th Feb 2016
#
uc
#
spark
#
tablets
New survey by Spark shows that New Zealanders over 55 are tech-savvy, with 70% feeling confident using technology.
Rumour mill

What is the rumour mill generating about future MacBooks?

Mon, 29th Feb 2016
#
apple
#
tablets
#
technology gifts
Rumour has it that by this June we could be approaching warp speed with the introduction of a new generation of MacBook Pros.
Cybe

What are the cyber security commandments?

Thu, 25th Feb 2016
#
wireless networks
#
cybersecurity
#
cloud services
Despite growing cyber threats, CompTIA finds many businesses and consumers lack adequate cyber security knowledge, making human error a leading risk.
Free wifi sign

Network security and tips for using free WIFI

Thu, 25th Feb 2016
#
wireless networks
#
cybersecurity
#
cloud services
Wireless networks can be left vulnerable if you have an old router with poor security. Likewise, free WiFi can be used to intercept your transactions.