Low tech joins the fight against high-tech theft
Article Abstract:
A range of options are because available for computer owners to protect their products from theft. Secure-It, a pioneer in computer locks, is among the companies that provide products for companies that prefer to bolt laptops, desktop computers and even CD-ROM drives. Computrace, meanwhile, offers a product that directs a modem to dial in occasionally to a central computer and disclose its location. The more popular low-tech products provide an effective deterrent against criminals, companies said. Inside jobs account for many computer thefts, according to experts. A Computer Security Institute poll showed that 65% of its 458 corporations, government agencies and universities reported laptop theft since 1997. Only viruses (84%) and unauthorized employee use of computers and software (78%) ranked higher in the survey.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
User Contributions:
Comment about this article or add new information about this topic:
Ah, the hiss of yesteryear: audio buffs look back
Article Abstract:
Older computer equipment is gaining popularity among serious designers and artists in addition to those seeking nostalgia. Musicians can rely on throwbacks such as reel-to-reel tape and old sound effects pedals to create sounds particular to a certain time period. Greater flexibility in previous generations of machines and software can help filmmakers present homemade filmstrips that parody government, educational and corporate presentations. Rising demand for sounds of the 1970s and 1980s has led manufacturers to sell digital synthesizers that mimic Roland and Moog synthesizer models. 'Virtual analog' synthesizers digitally recreates the sounds of defunct machines that are a few generations older.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Suspect in Internet break-in waives bond-hearing right. 4 college students charged with theft via computer. Indictment of hacker in computer fraud case
- Abstracts: Your call is important to them; navigating the frustrating world of technical help lines. E.D.S. plans data accord with Lucas
- Abstracts: From kitchen table to keyboard; investment clubs flock to Internet. Technology issues fuel stock market advance
- Abstracts: Component versus bundle pricing: the role of selling price deviations from price expectations. Norm extremity and interpersonal influences on consumer conformity
- Abstracts: Dyadic perceptions in personal source information search. Social support in the service sector: the antecedents, processes, and outcomes of social support in an introductory service