Feeds

Ten... iPhone 4 accessories

Add-ons for your Apple

Choosing a cloud hosting partner with confidence

iLuv Triple USB Charger

RH Numbers

The iLuv Triple USB Charger is an ugly-but-useful lump of plastic. It’s basically just a mains plug with three USB connectors built into it, allowing you to connect and charge three different devices at the same time. That might seem a bit unnecessary, but trust me – it’s an absolute godsend when you’re at a tennis tournament in Eindhoven and you need to charge your iPhone, iPad and camcorder in your hotel room. The charger comes with mains adaptors for the UK, Europe, Australia and the US.

iLuv Triple USB Charger

Reg Rating 80
Price $30 (£19)
More Info iLuv

Kensington Bluetooth Hands-Free Car Kit

RH Numbers

If you absolutely must use your iPhone when driving then Kensington’s Hands-Free Car Kit will at least ensure you keep your hands on the wheel. The device consists of a Bluetooth-enabled speakerphone unit that clips to the sun visor in your car, allowing you to receive calls while you’re driving. You can also make calls quickly, simply by pressing one of the three programmable speed-dial buttons. The rechargeable battery provides about ten hours of talk-time, but the kit also includes a spare battery that you can slip into your glove-compartment and keep as a back-up.

Kensington Bluetooth Hands-Free Car Kit

Reg Rating 80
Price £80
More Info Kensington

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.