Students at Drexel University in Philadelphia now have a potentially GPA-saving option if they have a sudden need for a laptop -- an automated kiosk that dispenses MacBooks.
While the iPad has made giant strides in the enterprise, it is still hobbled because it doesn't replace laptops in many use cases because of immature tablet apps and security concerns. But the case for tablets in the enterprise will only get stronger in the next few years.
Concerned that your employees are being a bit lax when it comes to looking after their laptops? Steal them yourself, one vendor has advised in the wake of yet another damning security report that suggests laptops and other equipment are literally walking out of Australian companies that are still operating at far below world's best practice when it comes to device security.
The Dell Inspiron M501R is a 15in laptop with a triple-core 2.2GHz AMD Phenom II N850 CPU, 4GB of RAM and a 500GB hard drive.
We take so much technology for granted today, but it wasn't that long ago that laptops, ATMs, cell phones and the Internet didn't exist-and hold enormous sway over our day to day lives.
Whitepapers about laptop
During the past 40 years, information technology has undergone many revolutions in how applications and data have been delivered to users. Mainframes provided a centralized computation facility where end users consumed resources on a shared basis. Client-server architectures offered flexibility and lowered computing costs while bringing more power to the desktop. Mobile computing introduced the notion of anytime, anywhere application access from a laptop or handheld device. Now cloud computing offers a new approach that will enable you to deliver IT services on demand. Read on.
Sign up now »
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. This whitepaper examines the escalating complexity for the security management environment; ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Police urge banks to install ATM chip technology
- Twitter aims to become safer with two-step sign-in
- Prevent a hack attack with Twitter's new two-factor authentication
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave