Feeds

Complete Coverage

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

IFA 2008 All the stories from this year's IFA in Berlin

Laptops and SCCs
Acer: Aspire One HSDPA support is imminent
Hands on with Fujtisu Siemens' Amilo netbook
Samsung unwraps MacBook Air beater
LG prices up HSDPA-equipped mini laptop

HD TV
Daewoo divided over display
Samsung tries to snatch 'world's first 200Hz TV' title from Sony
'World's largest TV' sports super HD resolution
Philips pitches black with monster contrast LED backlight
Philips unveils 38mm-thick HD TV
Toshiba cooks up kitchen-ready HD TV/DVD combo
Toshiba unveils SD-to-HD resolution revolution
Sharp previews 1,000,000:1 contrast ratio LCD TV
Sony launches 200Hz telly technology

Digital TV
TVonics beefs up DVR, slims down Freeview box

Blu-ray and HD Content
Humax pledges to ship Freesat HD DVR by year's end
Blu Christmas coming, format fans forecast
Panasonic intros 'world's slimmest' Blu-ray players
Panasonic to bring IPTV into the mainstream

Phones
Garmin: Nuvi satnav phone release set for Q1 2009
Windows Mobile 6 blamed for Xperia X1 woes

PCs
Shuttle readies DIY Atom desktop PC

Music and audio
Logitech beefs up Squeezebox line - and then some

Satnav and GPS
Garmin: Nuvi satnav phone release set for Q1 2009
TomTom launches road-savvy satnav series

Bootnoes
Customs raids tech trade show
MSI repells reporter with military

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.