The great iPad mini heist
- 15 November, 2012 16:47
(Of course, this would have been a much lower-value theft if Apple wasn't charging so much for the new tablet!)
The Post draws parallels between this theft of 3600 iPads, which took place on Monday shortly before midnight, and a 1978 Lufthansa cash and jewelry heist made more famous in the movie "Goodfellas." The thieves allegedly used one of the airports forklifts to nab two pallets of iPads into a truck, leaving a few other pallets behind after being confronted by an airport worker.
Law enforcement is investigating whether this might have been an inside job.
Apple iPhones and iPads have increasingly become targets of thieves, who have robbed stores and individuals most frequently.
Bob Brown tracks network research in his Alpha Doggs blog and Facebook page, as well on Twitter and Google +.
Read more about data center in Network World's Data Center section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
How to Switch From iPhone 5S to BlackBerry Z30 (and Why)
CIOs to Become In-House Brokers -- and That's a Good Thing
The future of computing
10 Hot Hadoop Startups to Watch
The future of computing
Is Your IT Infrastructure Keeping Up?
This helpful infographic demonstrates how, when IT is the backbone of modern business, a converged infrastructure system can solve the challenge of cost, complexity, availability, rapid provisioning and flexibility.
Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
The F5 DDoS Protection Reference Architecture part 2 of 3
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.