(1) The term used to describe the theft of laptop computers when the perpetrator literally grabs the laptop out of the owner’s hand and runs away with it. (2) The theft of personal information to assume an identity and commit fraud. As defined by Intersections Inc., iJacking is an emotionally devastating crime that drains your […]
Short for Internet Keyed Payment, iKP is a set of protocols proposed by IBM Research in Hawthorne and Zurich, for electronic payments over open networks. iKP technology is based on RSA public-key cryptography and provides the architecture for credit card transactions between the customer and the merchant, while using the existing financial network for approval […]
Short for integrated Lights-out, it’s an intelligent remote management processor integrated in many HP ProLiant servers that provides IT professions with virtual presence — you get complete control of the server from remote sites akin to being local and using the server directly. iLO features include simplified setup, group configuration, remote power on/off, Secure Socket […]
An Apple computer intended for home, school, and small offices, and promoted by Apple as an easy-to-use, stylish computer that outperforms other low-cost options. The computer comes equipped with a 500, 600 or 700MHz G3 processor, 32 MB SDRAM, 4GB hard disk drive, a 56K modem, and a Universal Serial Bus (USB ), which allows […]
iPAQ is the name of the HP PDA. The iPAQ was initially introduced by Compaq, but after Hewlett Packard’s acquisition of Compaq, the product has been marketed under the HP brand.