Feeds

Chinese cops opt for Segways

Counter-terrorist taskforce gets mobile

Security for virtualized datacentres

Chinese authorities are going high-tech and have begun equipping elite crime fighting units with motorised Segway scooters.

chinese_segway_cops

China's police are getting mobile

According to the front page of daily newspaper The First, Chinese armed forces were recently spotted using Segways during a counter-terrorist exercise called “Taishan 2008”. The exercise is thought to have taken place in Jinan, Shandong Province.

It’s not clear why Chinese authorities think Segways are the perfect technology for transporting crime-cutting troopers. But if they really want to ensure the country’s cops can get there quickly and shoot on target, then perhaps they should consider strapping Mio’s Knight Rider satnav onto each Segway and training their officers using Grand Theft Auto IV.

The second problem is that the standard speed setting on a Segway is only around 12mph, so Chinese police had better hope that criminals don’t suddenly hop into a getaway car.

The idea might strike you as purely a publicity stunt, but Chinese cops could be taking a lead from police in Glen Falls, New York. Officers in the American state already use Segways whilst on duty and claim the machines help make cops more visible during patrols.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.