Archive for Grudzień, 2010

Konica Minolta Wins an Award from Better Buys for Business for the bizhub PRESS C8000 Color Digital Press!

By admin, 30 grudnia, 2010, No Comment

BlackBerry smartphone helping you drive safely this festive season

By admin, 16 grudnia, 2010, No Comment

Whether you’re staying in your home town or heading off to a holiday destination, you’re sure to be spending a lot of time in your car this festive season.

Your BlackBerry® smartphone offers you a selection of great apps (available from BlackBerry App World™) and accessories that you can use to find your way to your destination, stay in touch and keep safe as you navigate through the holiday traffic.

BlackBerry Messenger

Share your pin or unique barcode to connect with friends anywhere, anytime. Take comfort in knowing your friends and loved ones are only a BBM™ (BlackBerry® Messenger) message away.  Update your BBM status before travelling to “Busy. On the road to Cape Town” or just “Busy. Driving” to ensure your contacts now why you are not able to respond immediately. Don’t use it while you’re driving – wait for your next pit-stop.

For more information, please visit

GPS on Your BlackBerry Smartphone

GPS technology is built right into many new BlackBerry® smartphones. You can use the GPS on your BlackBerry smartphone to get step-by-step driving directions to ensure you never get lost. You can also use the GPS technology on your smartphone to get your GPS location and to use location-based applications and location based services. reads your text messages and emails out loud so you can concentrate on the road. Eliminate the temptation to reach for your phone by letting read to you and automatically respond for you. Stay connected by listening to your messages without texting while driving or reading emails in your car.

For more information, please visit

Vlingo – Voice App

Vlingo is the intelligent voice app that turns your words into action. It reads new messages out loud as they come in. Voice recognition lets you enter text faster than typing. And voice commands let you open other apps, send texts and emails, chat via BBM™ (BlackBerry® Messenger), update Facebook® and Twitter®, and more.

For more information, please visit

BlackBerry Visor Mount Speakerphone

The BlackBerry® Visor Mount Speakerphone helps drivers communicate, while keeping their hands on the wheel and their eyes on the road. It’s a Bluetooth® enabled device which allows you to stream calls from a BlackBerry smartphone over the car’s stereo system and receive verbal caller IDs so that you can enjoy your smartphone on the road. If you have a third-party location-based application on your BlackBerry smartphone that provides driving directions, the BlackBerry Visor Mount Speakerphone is designed to announce these driving directions to you.

For more information, please visit,

BlackBerry Premium Stereo Headset

Keep your hands on the wheel with a BlackBerry® Premium Stereo Headset. It gives you quality audio and sound isolation when you’re listening to music or chatting on the phone. The modern design incorporates style and manageability with features such as an elstomeric cord for less tangles and sleek control to switch between media options and the phone with a single touch.

For more information, please visit,

BlackBerry Wireless Headset HS-500

Get the freedom of hands-free calling with the easy-to-use BlackBerry(r) Wireless Headset HS-500. With the simple touch of a button, you can answer, end and mute calls, or activate voice dialing. Plus, the volume automatically adjusts and background noise is reduced, so your calls and turn-by-turn directions can be heard loud and clear in noisy environments.

For more information, please visit,

Car Charger

When you’re on the road, a fully charged BlackBerry smartphone is more than a convenience – it is a necessity. The BlackBerry(r) Car Charger makes it easier than ever to keep your smartphone fully charged. Just plug it into your car’s “cigarette lighter” and it charges your smartphone rapidly, and helps preserve the life of your battery. It comes with a coiled 30cm cord that stretches up to two meters for your convenience in any vehicle.

2010 – dubbed the year of vulnerability

By admin, 15 grudnia, 2010, No Comment

2011 – steal everything

Kaspersky Lab says the complexity of threats reached a whole new level in 2010 and Spyware 2.0 will be the new cybercrime concept for 2011

Kaspersky Lab, a leading developer of secure content and threat management solutions, presents its annual overview of the IT threat landscape titled ‘Outcomes for 2010 and Predictions for 2011’.

Author of the review, Alexander Gostev, Chief Security Expert at Kaspersky Lab, reveals that the main trends seen in 2009 continued into 2010, although their levels of sophistication reached completely new heights in a number of cases.

•    Attacks carried out via browsers and botnets remained the biggest threat to computer security. If anything, 2010 should be dubbed the Year of the Vulnerability – the tool predominantly used to help malware penetrate victims’ computers.
•    Meanwhile, hackers increasingly turned their attentions from vulnerabilities in Microsoft products to those existing in the software products of Adobe and Apple.
•    Most of the malware evolution developments predicted in 2009 by Kaspersky Lab came true during the current year.
•    As forecast, 2010 saw an increase in the number of attacks performed via P2P networks. This infection channel is now widely used, second only to browser attacks. Virtually all types of threats spread via P2P networks – file viruses, Rogue AV software, backdoors, SMS fraud programs and many different types of worms. According to data received from the Kaspersky Security Network, at least 3.2 million P2P-based attacks were carried out each month in the latter stages of 2010.
•    Cybercriminals continued to actively use so-called partnership programs. Semi-legal or ‘grey’ schemes became increasingly popular alongside openly illegal activities, such as infecting legitimate websites and users’ computers using drive-by downloads. Such semi-legal schemes include encouraging unwary users to voluntarily download dangerous files, black hat search engine optimisation (using unethical techniques to push malicious websites to the leading positions in search engine result pages), the use of eye-catching links and banners, redirecting traffic to adult content sites and other similar techniques.

Kaspersky Lab’s experts were also proven right concerning their predictions of malware epidemics in 2010. A number of malware incidents in 2010 can easily be classified as ‘global’ outbreaks due to the speed at which they spread; their scale and the attention they attracted. These included the botnets Mariposa, Zeus, Bredolab, TDSS, Koobface, Sinowal and Black Energy 2.0, all of which affected millions of computers worldwide. The Stuxnet worm was the climax of this new wave of complex new malicious software. Interestingly, it appears to be the case that the most widespread malicious programs tend to be the most elaborate in terms of the technologies used.

“The Stuxnet case is of particular interest not only because of its extraordinary complexity, but also because it targets programmable logic controllers (PLCs) used in industrial manufacturing,” says Alexander Gostev. “This is the first serious, high-profile instance of malicious activity with the potential for significant industrial sabotage. This case has demonstrated that the long-standing boundary between the virtual and real worlds is beginning to erode. This presents some very new problems that we will all have to tackle in the near future.”

The prediction that the number of Rogue AV programs would decrease was a bold one, but it was also borne out. Having reached a peak in their activity at around 200 thousand incidents per month in February-March 2010, they fell off to a quarter of that amount by late 2010. The remaining Rogue AV programs are becoming increasingly region-specific.

The prediction that cybercriminals would pay more attention to the iPhone and Android platforms turned out to be partially correct. Several concept programs were created for the iPhone in 2010 that demonstrated the potential risk associated with this device, as well as a number of technologies that could be employed by attackers in the future. Malicious programs for Android have been detected that are explicitly criminal in nature, making use of the widespread technique of mobile Trojans to send SMSs to premium-rate numbers.

Alexander Gostev’s review goes on to outline a number of trends and incidents that have considerably influenced the IT security industry. These include targeted attacks on corporate and industrial facilities, most important of which were the Aurora attack and the emergence of the Stuxnet worm.

•    The events of 2010 are likely to bring about a major shakeup in the types of criminals orchestrating cyber attacks as well as their aims and the methods they use.  As a result, in 2011 we will be faced with the widespread use of a new class of spyware programs, the aim of which can be defined quite simply as: steal everything. They will gather any information that they can about users, right down to the colour of their hair and eyes, and will examine every document stored on infected computers.
•    Industrial and state espionage will become more pervasive, with less emphasis on precision attacks. Cybercriminals will start targeting a much broader range of organisations, no longer concentrating solely on online banks and electronic payment systems. The principal aim of many new virus writers and their clients will be the acquisition of someone or something’s complete profile, rather than making a quick buck by stealing credit card details or distributing spam.
•    Potential changes to the structure of the malware authoring community are also likely to have a profound impact on the IT threat landscape during 2011. The emergence in 2010 of the technologically sophisticated Stuxnet worm that attacked industrial-class programmable logic controllers, was an impressive demonstration to the whole world of just what the cybercriminals’ arsenals contain, as well as a wake-up call to the IT security industry because of how difficult it was to counteract. It cannot be ruled out that governments and commercial organisations will make use of Stuxnet-like programs for their own ends.

“It is possible that we will only see the beginnings of these kinds of attacks in 2011, with their full force only being felt in years to come. However, it is already clear that the arrival of this new generation of cybercriminals means that those tasked with counteracting such cyber threats will need to raise their game considerably,” Alexander Gostev points out.

The primary method of carrying out malware and hacker attacks will make use of vulnerabilities in legitimate software and will be carried out via browsers. There will be an increase in the number of threats targeting 64-bit platforms, as well as more attacks on mobile devices, mobile operating systems and users of social networks. However, DDoS attacks will remain one of the biggest problems plaguing the Internet.

Wikileaks: a new playground for cyber-criminals to lure in unsuspecting users?

By admin, 15 grudnia, 2010, No Comment

- A Cyberoam Security Alert on the unfolding saga of the whistleblower website

As the controversial website Wikileaks renews the age-old debate between “free speech” and “government censorship”, the knives are out in full view of the print, electronic and online media. In view of current developments, the security player Cyberoam is anticipating cyber-criminal attempts to imitate Wikileaks so that they can target Internet users with phishing fraud, malware infections and more.

It’s not very often when we get to see so much global attention poured on the topic of free speech. The official arrest of Wikileaks founder Julian Assange has already led to an unprecedented war of words and reciprocal cyber-attacks between hacktivists and the government/corporate machinery. Presently, if one had to capture the shared sentiment of a growing multitude of Wikileaks backers, they would happily donate money to keep their favourite website alive.

This is where lies a great opportunity for your regular band of cyber-criminals. While a few of them could possibly empathise with the whistle-blowing fugitives, a good majority of cyber-criminals only intend to ride on the current level of interest on Wikileaks to target unsuspecting victims through spam, email click-frauds, phishing attacks and more.

Internet users are hereby advised to exercise caution while dealing with any purported communication claiming to be from the website. Here are three important tips on protecting yourself from these online scammers.

Beware of “donation” requests: As VISA, Mastercard and online merchant gateways such as Paypal continue to tighten their screws on funds transfer to Wikileaks, there is a possibility of scam emails requesting credit card-holders to send money to anonymous “agents” working for the benefit of the website.

Scammers will take advantage of the fact that merchant gateways have already blacklisted key Wikileaks recipients, which gives an added reason for would-be donors to trust these anonymous “agents”. Such scam emails may mirror everything from the lay-out of Wikileaks to the contact details of key people associated with the site.

Don’t click on suspicious URL links: Some of the URL links on spam messages can possibly install malware on the user’s computer or hijack browser sessions with rootkit functionality. Having your computer experience slow downs, frequent reboots and disappearing files because you wanted to experience the fun side of Wikileaks is not a very good bargain!

Watch out for attacks from social networking platforms: Social networking websites such as Facebook, LinkedIn, etc. thrive on a false notion of trust users place in the network which can become a breeding ground for malware. Moreover, cyber-criminals are often more adept in leveraging social networks to enticing users to click links, install unwanted applications while escaping the radar of security investigators.

Moving to IP telephony – the Top 5 considerations for success

By admin, 13 grudnia, 2010, No Comment

IP telephony is billed as the future of communications, as it enables the convergence of voice and data on a single network, allowing for multiple communication formats, from traditional voice to instant messaging and email to be brought together on a single platform. Many organisations have taken the decision to move onto this platform, with varying degrees of success, and many others are considering implementing IP telephony.

“IP telephony without doubt provides many benefits, including access to rich applications on the desk unit that can be linked into back end software, as well as simplified maintenance and reduced associated costs. However IP telephony, as much as it is the future, is simply not viable at this stage for all organisations,” says Dawie Bloomberg, Business Services Director at The Webcom Group. “If you have been through the steps in taking this decision and concluded that IP is the right move for your organisation, there are several considerations that can and should be dealt with in order to ensure maximum success rates and satisfaction with the end result.”

Migration or forklift upgrade?

The first decision that needs to be taken is whether to conduct a forklift upgrade or whether to do a phased migration onto IP telephony. Each one has its own pros and cons, explains Bryant Dennis, co-owner of Converged Telecoms, a Webcom Group partner.

“A forklift upgrade will obviously circumvent many of the issues associated with a migration, but it is a costly exercise as it requires a lot of new equipment to be purchased. Migration on the other hand, allows these costs to be spread out somewhat. However, migration involves many steps which can complicate the process, and often involves some type of third party gateway solution which is not an ideal scenario,” he says.

An examination of the current environment will reveal whether it can be migrated without the use of third party gateways, but the cost implications of a migration need to be carefully considered before this step is taken. If the hardware is fairly recent then it may be able to be reused by changing out the processor, but this may involve taking on more legacy hardware that could cause long term issues to creep in. Replacing the physical telephones as well as the hardware could prevent these problems, and implementing an IP platform with the future view to fully move onto IP telephony may be the most cost effective solution in the long term.

Understand the physical infrastructure

“The next step that needs to be taken is to gain a full understanding of the existing physical environment and infrastructure. If you have a dual CAT5 network are you going to run voice and data separately? If you only have a single CAT5 then do you have Quality of Service on the network to give priority to voice traffic? These questions need to be answered before any move into IP telephony can become a reality,” Dennis adds.

If an organisation is running a network to the desktop then hardwired IP phones can be implemented. If your organisation is running a wireless LAN however, then this will involve IP wireless phones which may not be as stable as required or provide the desired level of quality. The existing data switches also need to be examined to see if they can handle voice, in other words whether or not they are managed switches. If you need to upgrade the entire data network, this can have serious cost implications.

Do your homework when selecting a solution

“Choosing an IP telephony solution involves some legwork as picking the cheapest product without considering the offering completely can cause future headaches. If you are going to spend the amount of money a move into IP telephony will take, make sure you spend it with the right company,” says Bloomberg.

Make sure that the vendor or supplier you select can deliver a total end-to-end platform that has the capability to add in any type of media and communications format you may want now or possibly in the future. A SIP rich solution from a provider that is a specialist in unified communications is the best solution to avoid vendor lock-in. An open platform solution will enable you to choose the hardware and devices you want regardless of brand, so that you can get a best of breed solution to meet your organisation’s specific needs.

Look out for islands of technology

When moving to IP telephony the voice and data networks are not the only factors that need to be considered. All third party applications that may be running off the existing voice environment need to be taken into account, such as fax servers, telephony management systems, voice loggers and so on.

“The implications of a move to IP can be huge,” explains Dennis. “It is not simply a case of moving from analogue to digital but running voice off a totally new platform. Third party applications cannot just be plugged into the new system and expected to work, so the cost implications of this, including new applications and lost productivity should the systems not work, need to be taken into account as well.”

Make sure your providers are on the same page

“For smaller organisations, a one-stop shop that can deliver voice, data and ISP services may suffice. But for larger enterprises it is more common to have separate expert providers in each of these spaces. This makes it vital to ensure that all of these providers are on the same page when it comes to meeting your converged communication needs,” says Dennis.

The best way to ensure that this does in fact happen is to find specialists in each field who have strategic partnerships and sound working relationships with other specialists that can deliver on the other aspects of the converged network. Voice, data and the ISP need to be able to work together to deliver a strategy and solution that will meet the needs of an organisation now and into the future.


By admin, 13 grudnia, 2010, No Comment

Better networks at lower cost

By admin, 11 grudnia, 2010, No Comment

The cost of state-of-the-art networking solutions has just dropped, with the announcement of a substantial cost reduction on DrayTek products in South Africa.

DrayTek’s partner in southern Africa, Network Platforms, said today that it is reducing prices of DrayTek products by about 12% across the board.

Says Network Platforms CEO Bradley Love, “The DrayTek product range is well known as the leading brand of router and firewall products. Based on our strong sales track record and the Rand-dollar strengthening, we have been able to negotiate a significant price reduction on this product range that we are now passing on to end users.”

DrayTek solutions range from enterprise-level firewalls to mission-critical VPN/VoIP facilities for SoHo and various xDSL/broadband devices. The company’s telecommunications products set market trends and go way beyond customers’ expectations.

Love notes that in the past some users have selected less robust network solutions based on the cost factor, and the price reduction will now enable them to purchase a superior product that will give them greater functionality.

“The reputation of DrayTek products is growing,” says Love. “The feedback that we get from customers internationally is that they have better functionality and stability, particularly from a firewalling perspective.”

The DrayTek brand has become synonymous with quality and service. The company’s commitment to excellence has won the brand recognition from various IT evaluation institutions. In 2008, DrayTek won the UK TechWorld Award based on its Vigor 2820Vn wireless router. High customer satisfaction reflects in awards such as PC Pro Recommend, IT Reviews Recommend and the Trust Review Recommend.

Love notes that some customers standardise on DrayTek products because they are of high quality and having a single product range installed makes support easier.

The functionality of DrayTek products is a key factor in buying decisions. As Love observes, “Bandwidth is costly in South Africa and businesses can reduce that overhead by implementing smart strategies using these top-end products. For example DrayTek routers can provide content management functionality so companies can block popular sites such as Facebook in order to reduce bandwidth wastage.”

One of the strong points of DrayTek routers is their ability to handle VPNs, which are particularly useful when companies need to hook up multiple branches to their head office and shift large volumes of data between them.

Says Love, “DrayTek products are very stable and robust. They provide good 3G failover if the primary ADSL line goes down. One of the models has a built-in ADSL modem as well as an Ethernet WAN port that can be plugged into any other device.”

Network Platforms reached new highs in its sales of DrayTek products last year, a fact that Love attributes to increased brand awareness of this highly robust product range.

“Our sales have been very good this year too – there was a slowdown for a couple of months after the World Cup, possibly because Telkom had put a hold on installing new infrastructure – but sales are back up to speed now.”

Love expects the price reduction to boost sales considerably as users take advantage of the improved ROI to enhance the standard of their network hardware.

Kaspersky’s growth continues

By admin, 11 grudnia, 2010, No Comment

Kaspersky Lab, a leading developer of secure content and threat management solutions, continues its global market growth in the endpoint security market. According to IDC’s annual report, the company grew by 44.5 % in 2009 and acquired a 5.8% overall market share.

Kaspersky Lab ranks fourth in the IDC rating of Worldwide Endpoint Security Revenue by Vendor for 2009. The rating was published in IDC’s Worldwide Endpoint Security Market 2010-2014 Forecast and 2009 Vendor Shares report, which ranked software vendors according to earnings from sales of endpoint security solutions in 2009.

According to IDC’s Worldwide Corporate Endpoint Security Revenue by Vendor for 2008 and 2009, Kaspersky Lab demonstrated a growth rate of 24.6%, which is well above the average rate observed among other vendors. The company is fifth in the global ranking of corporate security vendors.

In IDC’s Worldwide Consumer Endpoint Security Revenue by Vendor for 2008 and 2009, Kaspersky Lab’s growth figure was 56.3%. The company holds fourth position in the market with a market share of 6.7%.

“Kaspersky Lab invests in its growth on a global scale, both in the consumer and corporate IT security market segments, both products and services,” said Eugene Kaspersky, CEO and Co-Founder of Kaspersky Lab.  “The results reported by IDC prove that our growth strategy works well worldwide. The revenue increase of over 40% in 2009 is a good result, and our aim has been to increase this further in 2010. We are sure Kaspersky Lab has considerable potential for growth in every market segment that we operate in.”

Cloud computing to boost economies

By admin, 11 grudnia, 2010, No Comment

Private and hybrid cloud models lead the way in driving business creation, competitiveness and economic growth across the Eurozone, according to The Centre for Economics and Business Research and EMC

€177.3 billion per year could be added to Europe’s major economies by 2015 thanks to cloud computing, The Centre for Economics and Business Research (CEBR) has revealed in its 2011 Cloud Dividend report. Sponsored by EMC, the report is the first of its kind to calculate the value of cloud computing adoption, at a macro-economic level, to Europe’s five largest economies.

The CEBR report calculates that €177.3 billion per year will be generated by 2015, if companies across France, Germany, Italy, Spain and the UK continue to adopt cloud technology as expected.

Inana Nkanza, Country Manager of EMC Southern Africa, comments: “Significantly, the research finds that the lion’s share of this value will be provided through the adoption of private and hybrid cloud computing models.”

The CEBR found that the annual economic benefit of cloud computing for each country by 2015 will be:
•    France – €37.4 billion
•    Germany – €49.6 billion
•    Italy – €35.1 billion
•    Spain – €25.2 billion
•    UK – €30.0 billion

€177.3 billion could cover the loans already made to some of the indebted countries in the region, such as Ireland (€85 billion) and Greece (€110 billion), and would comfortably pay for the four-year €95.7 billion cuts to public expenditure recently announced by the UK government.

Cloud computing is a new approach to IT, in which technology is made available to businesses in a scalable manner and as a service, when they need it. This speeds up time-to-market, removes traditional barriers to entry and allows companies to exploit new market opportunities. This ‘business creation’, as a direct result of cloud computing, will have a profound effect on the market structure of many sectors as competition increases and, thus, on global macro-economic performance, according to the CEBR.

The CEBR believes that cloud computing will be a significant driver of economic growth, competitiveness and business creation across the Eurozone. It highlights the important role that this technology will have in the economic recovery of the territory, particularly in facing the increasing threat posed by emerging economies that traditionally benefit from higher levels of competitiveness.

The study focused on the three most common cloud computing models today: public cloud, which is controlled by a cloud provider; private cloud, which is controlled internally by an organisation’s own IT team; and hybrid cloud, a combination of the two.

By 2015 CEBR predicts that €133 billion – or 75% of the total economic benefit of €177.3 billion that year – will be accounted for by the non-public cloud models. The private cloud model offers the best of both worlds: organisations get the dynamic, on-demand, self-service and scalable benefits of the cloud, but control remains with the IT department so security and governance are not compromised.

During the CEBR’s investigations, it also found that the private cloud will increase business development and business creation by €23.8 billion. The indirect and induced investment and general spending that results will generate demand for goods and services, which in turn increases gross value added (GVA) and employment in the economy. The CEBR predicts that the indirect economic benefits will result in additional GVA across all five countries of €280 billion cumulatively – and €60 billion annually – by 2015, and that indirect and induced employment generated between 2010 and 2015 could be as high as 2,396,000.

CEBR Managing Economist Oliver Hogan says: “CEBR’s study shows that not only is cloud computing an issue from the micro perspective of boosting the efficiency of an individual company’s IT investment and, hence, of its corporate productivity, but also that, especially in the present uncertain economic climate, it is likely to be a critical macro-economic factor that will be crucial for boosting Europe’s economic growth. As a driver of enhanced productive performance, cloud computing is likely to be especially important in playing a part to ensure that Europe’s international trading position remains competitive, hence boosting export growth. Moreover, as one of the major means of maximising the ‘bang for buck’ in modern IT investment, cloud computing could also be an important driver of European business investment that will, in turn, drive European economies forward.”

Nkanza adds: “The agility and competitiveness engendered by private and hybrid cloud computing represents a real opportunity for European businesses – one that will help companies to grow their advantage while driving economic recovery across the country. It is widely accepted that economic recovery will be achieved and sustained via a combination of driving down economic debt while encouraging commercial competitiveness. Cloud computing, which will disrupt many current IT technologies by offering more efficient, more flexible and less complex solutions, represents a real way to contribute to this.”

As well as leveraging opportunities for business creation, companies are also able to make dramatic cost savings by employing cloud computing. The pay-as-you-go model means reduced capital expenditure (CAPEX) and operating expenditure (OPEX) costs, quicker ROI, and more valuable re-deployment of resources. These savings can be re-invested, encouraging innovation, nurturing competitiveness and directly improving profitability – all with a measurable impact on the nation’s economy.

Tablet notebooks to take the market by storm

By admin, 10 grudnia, 2010, No Comment

Tablet notebooks are poised to take the market by storm and will change the way the user views computing – and the way he uses the traditional desktop PC and notebook.

This is according to Christopher Riley, MD of The Notebook Company (, who said that while he thought tablet PCs would make their mark seven years ago, this prediction proved to be incorrect. But now is the time, he believes.

Riley said that he had noted that he thought it was the time for the Tablet PC seven years ago. “I was a bit out in my prediction. But it is certainly the time now. Until recently users have been scared to move over from one operating system to another. But the influx of phones, smart phones and similar products has made users more at ease to use different operating systems. Most of the latest and different kinds of operating systems have also learnt to be more intuitive, so that the user does not have a huge learning curve to go through.

“This is definitely the start of a new generation of Tablet PCs, I-Pads, We Pads, They Pads, Us Tablets and We All Pads.”

Commenting further, Riley said Tablet/PC sales have increased exponentially at The Notebook Company from a very low base in 2010. Up to 30% of sales now consist of Tablet PCs.

“Users should also take note that a Tablet PC is not a replacement for a laptop – it is a completely different device.

“For example, my laptop has replaced my desktop. It is basically stationary on my desk and will only move to a specific meeting – in my case – once in every three months or so.

‘My Tablet/Pad travels through my house – either I am browsing the news, searching for something with my kids, playing a game, watching Google Earth (even street view), reading in the bedroom, or taking it away on weekends.

“My Tablet/Pad essentially travels with me – and with on-line applications such as Google docs and Gmail, it also enables me to effortlessly do work on the run.”

Pretoria-based The Notebook Company ( became the sole reseller of the Acer 102 tablet notebook back in 2003.

On the 10th, 11th and 12th of February 2003 Microsoft staged the annual Microsoft Architect’s Forum in Johannesburg. Riley said that, during this event, 150  Microsoft partners tested the new Acer 102 tablet notebook “to determine in which ways they can implement this amazing technology into their respective companies”.

“Tablet notebooks offer users the unique ability to write text on the LCD panel. This is good news for those who still haven’t mastered typing – and the handwriting recognition software is mind-blowingly accurate,” he said.

The Acer tablet notebook’s screen can be swivelled around to 180 degrees and placed flat on the casing to simplify writing.

“It’s perfect for those who attend meetings due to the fact that writing does not create any distractions – such as  typing onto a notebook – or big LCD panels which are placed in theupright position.”

wielkoformatowe wydruki Lublin kolorowe wielkoformatowe skanowanie kolorowe skanowanie Lublin drukowanie drukowanie projektów w lublinie skanowanie lublin hempla lublin wydruki lublin centrum skanowanie lublin