Feeds

Ten unlikely iPhone insurance claims

What's the damage?

Security for virtualized datacentres

In the past year, one in five iPhone users insured with Protect Your Bubble made a claim. What for? Since you ask...

Top ten wacky claims

1. I dropped it from a hot air balloon
2. I lost it while sky diving
3. It broke when my son used it as a table tennis racket
4. I lost it while building a sand castle for the kids
5. I accidentally buried it in the garden
6. It fell into the kettle
7. I dropped it in a food blender
8.  My dog chewed it to pieces
9. Juice from a defrosting piece of meat leaked into it
10. It flew out of the car window

Most common claims - no real shockers here

1. Cracked screen
2. Stolen while texting
3. Couldn't hear the other person when making a call
4. Leaving phone on the car roof so it falls off when driving
5. Pet knocked the phone off the surface
6. Stolen from handbag
7. Internet connection completely broken
8. iPhone doesn't charge
9. Dropped in the bath / toilet
10. Screen freezes

With that many ways an iPhone can get damaged, lost or stolen, insurance is probably a good idea. Don't get caught with your trousers down - and your precious Apple in the toilet. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.