{"id":938,"date":"2008-04-04T13:30:45","date_gmt":"2008-04-04T13:30:45","guid":{"rendered":"tag:www.legitreviews.com:\/\/78c289d53f776def3a0a8f115edaa3de"},"modified":"2008-04-04T13:30:45","modified_gmt":"2008-04-04T13:30:45","slug":"intel-preps-laptop-anti-theft-tech","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=938","title":{"rendered":"Intel preps laptop anti-theft tech"},"content":{"rendered":"<p>Intel plans to release an anti-theft technology for laptops during the fourth quarter of this year, but the company isn&#39;t offering many details yet. Called Intel Anti-Theft Technology, the new capability will be added to Intel&#39;s Active Management Technology, which is part of Centrino vPro and allows IT managers to remotely access and configure computers. <\/p>\n<blockquote>\n<p>In the event of theft, the technology will &#8220;basically lock the system, lock the disk, so people cannot be maliciously using and getting the data,&#8221; said Dadi Perlmutter, executive vice president and general manager of Intel&#39;s Mobility Group, according to a transcript of his presentation at the Intel Developer Forum (IDF) in Shanghai. <\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Intel plans to release an anti-theft technology for laptops during the fourth quarter of this year, but the company isn&#39;t offering many details yet. Called Intel Anti-Theft Technology, the new capability will be added to Intel&#39;s Active Management Technology, which is part of Centrino vPro and allows IT managers to remotely access and configure computers. <\/p>\n<blockquote>\n<p>In the event of theft, the technology will &#8220;basically lock the system, lock the disk, so people cannot be maliciously using and getting the data,&#8221; said Dadi Perlmutter, executive vice president and general manager of Intel&#39;s Mobility Group, according to a transcript of his presentation at the Intel Developer Forum (IDF) in Shanghai. <\/p>\n<\/blockquote>\n<p> <a href=\"https:\/\/computerhunter.us\/?p=938\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":38,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-938","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=938"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/938\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}