![]() | |
![]() | |
![]() |
Personal Technology Information |
|
![]() |
An All Too Familar Pain
Lost & Found for the 21st Century In today's hectic world more and more people are turning to those handy gadgets and mobile products that can be taken with them anywhere they go. The more things consumers own, the more they're prone to lose them. This in mind we actually went out and tested a new service on the UK market from Want it Bak. Lets see what Londoners are really made of. We left a Palm m130 PDA on the Jubilee Line of the London Underground, a Sony Ericcson Mobile on the number 15 bus route, a Blackberry "email on the move" gizmo down in a local pub in South West London and a rucksack sitting in Starbucks Chancery Lane area. Lastly we left a digital camera sitting out in the open in Hyde park. Not the easiest thing leaving items lying about in this highly security conscious world we live in these days. Here in the 21st century our lives have become more and more reliant on mobile items. As we go through our days, keeping a mental log of everything we have and where we have it becomes more and more difficult. It is inevitable that some things get lost. In fact as stated in a recent research "Around 62,000 mobile phones were left in London taxis during the last six months. That's an average three phones per taxi, according to a survey of licensed London cabbies by the Taxi Newspaper and Pointsec Mobile Technologies. Absent minded and drunken travellers also forgot 4,000 laptops and 5,000 PDA's when exiting cabs". So what can we do to have give us some reassurance that we have at least a chance of getting our valuable or even sentimental items back. In steps lost and found for the 21st century in the form of Want it Bak. The service is based around the belief that most people are actually honest and will do the right thing if a method is offered to them. This feel good factor is enhanced by the added incentive of a reward for doing the right thing. Anything you can imagine, mobile phones, keys, cameras, PDA's, laptops, binoculars, backpacks, passports, briefcases, wallets and purses, golf clubs, power tools, textbooks, credit cards, cheque books... you get the picture, it can all be protected using their simple system. How does Want it Bak work? Simple. You purchase a range of security tags each with their own unique id number. You register them with Want it Bak and that's it. If you ever lose the item and someone finds it they contact Want it Bak directly using their website or their 0800 number and they arrange a courier to pick it up and return it to the owner for a small admin charge. One of the best things about this service is the confidential nature of it. The "Finder" never knows who the owner is and vice versa. Reassuring for owners of expensive items, they can now safely retrieve their possessions. "It's a great incentive for people to do the right thing", says Chris Cameron from Want it Bak, "Our research shows that most people are actually honest and the biggest barrier they have to returning items is the hassle of finding out who it belongs to, arranging delivery or pick up, getting the time to drop the item off at the local police station. Now they don't have to do anything except ring us or visit our website, and they get a Reward for their troubles". The "Finders" themselves are offered a basic reward of £10 gift pack of Want it Bak Labels. Additionally the finders may also receive gift vouchers, shop discounts, trial packs and much more. Customers may also offer an optional CASH reward to Finders as a thank you to the person for taking the time to contact Want it Bak. Want it Bak organises Couriers to pick up and delivery directly to you your lost item. As a customer of Want it Bak you are only charged if an item is lost. No ongoing monthly subscriptions or fees. Just a basic Administration charge when an item is found of £25 which includes next day courier delivery UK wide. A small price to pay for the return of your personal items. "This service is invaluable" say Russell Lewis of Chelsea, an actual benefactor having signed up from the start. "A few weeks back while travelling home in a Black Cab I left my portfolio containing vital customer information and demonstration CD-ROMs. It would of taken me weeks, if ever at all, to redo everything. Before the end of the day Want it Bak had taken a call and I had arranged for it to be sent straight back to me. This is an amazing service, it was all so easy." So how did we go with our test?Well Want it Bak claim an 80% return rate, which works out to about 5 out of 6 items. It seems Londoners are more honest that we thought. The camera was found by someone in Hyde Park and within the hour Want it Bak had taken the call and arranged return. When originally registering this item we had offered £50 cash reward to the finder. The "finder" Sam, an office worker was very impressed "I was out walking at lunch time and came across the camera just sitting there. Having personally lost my camera while holidaying in Greece earlier in the year I knew how annoyed the owner would be. The Want it Bak labels were visible enough and probably prompted me more to the right thing than if they hadn't been there. The whole process only took me a couple of minutes when I got back to the office. Want it Bak arranged a time for the courier to come and they picked it up from me at work. Few days later my reward and £50 cheque turned up in the mail. Fantastic." The PDA & Blackberry were also found by good Samaritans and returned. In fact the only thing still outstanding was the rucksack left in a Starbucks, strangely enough the least expensive of the 5 items. No doubt the cause of a police call out during these troubled times. The mobile phone turned up a couple of days later. No bad 4 out 5. Well done London. Like most things these days there are no guarantees of course, but just the knowledge that for a small price you can have an additional type of insurance that works when you need it to. www.wantitbak.com for more information.
MORE RESOURCES: Live, Laugh, Logged-On: Women & Personal Technology Getty Images Championing health tech innovation across borders: From personal setbacks to global entrepreneurship Harvard Gazette How to Secure Your Phone’s Data Before Traveling Abroad The New York Times Column | Zuckerberg’s new Meta AI app gets personal in a very creepy way The Washington Post TOP 10 personal tech and gadgets of 2024 Designboom Raspberry Pi slices Compute Module 4 prices theregister.com The Latest Personal Tech at CES 2025- The Accounting Technology Lab Podcast - Jan. 2025 CPA Practice Advisor Personal Enrichment Courses Wake Tech Can Using a Dumber Phone Cure ‘Brain Rot’? The New York Times About National Personal Protective Technology Laboratory Centers for Disease Control and Prevention | CDC (.gov) How Tech Created a ‘Recipe for Loneliness’ The New York Times Why a Tariff-Inflated $2,000 iPhone Is Nothing to Fear The New York Times Google goes cold on Europe: Stops making smart thermostats for continental conditions theregister.com Tech for Babies Is Booming. Here’s What One Parent Found Helped the Most. The New York Times Ignorance really is bliss when you’re drowning in information theregister.com Not a Coder? With A.I., Just Having an Idea Can Be Enough. The New York Times Google wins 1-1: Judge rules ad giant broke some antitrust law theregister.com Top 10 Personal Gadgets For Tech-Savvy Individuals Designed To Revolutionize Their Routine Yanko Design Tech support session saved files, but probably ended a marriage theregister.com A new operating model for people management: More personal, more tech, more human McKinsey & Company Tariff uncertainty looms large over budget conscious CIOs theregister.com How to Spend Less Time on Social Media (or Leave It Altogether) The New York Times Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times How to Create a Multimedia Digital Journal of Your Life The New York Times Resellers may be sitting on costly pile of regret after US smartphone shopping spree theregister.com If TikTok Is Here to Stay, What Does That Mean for Us? The New York Times Framework guns for cheap laptops with upgradeable alternative theregister.com Tech Made Easy AARP The passive aggression of connecting USB to PS/2 theregister.com User said he did nothing that explained his dead PC – does a new motherboard count? theregister.com Why You Might Suddenly Be Following Trump on Instagram and Facebook The New York Times Laptop makers stalled on repairability improvements theregister.com Lenovo teases solar-powered and folding screen concept laptops theregister.com The sweet Raspberry taste of success masks a missed opportunity theregister.com Apple and Meta trade barbs over interoperability requests theregister.com This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times Wozniak: I didn't reduce chip count for manufacturing. I wanted to prove I was clever theregister.com Hisense QLED TVs are just LED TVs, lawsuit claims theregister.com HP ditches 15-minute wait time policy due to 'feedback' theregister.com Les Paul’s Klunker has been revived as a meticulous one-off replica by Les Paul's personal tech MSN How to Download Your Videos and Other Data From TikTok The New York Times Slack, Microsoft Teams, Google Chat: Is There Any Safe Place to Complain About Work Online? - WSJ WSJ Google says it's rolling out fix for stricken Chromecasts theregister.com Brit watchdog probes Google's search, ads empire theregister.com Android beefs up Bluetooth tag stalker protections theregister.com |
![]() |
![]() |
![]() |
RELATED ARTICLES
MCSE 70-290 Certification Primer Microsoft Certifications are one of the most widely acclaimed, pursued, and achieved technical certifications in the IT industry. The demand for Microsoft Certified Professionals in the job market is increasing every year. Setting File Permissions On A Unix Server File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. New Computer? Steps to Protect Your Computer Before Connecting to the Internet Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back. Windows Task Manager in English You use Ctrl+Alt+Del to see what's running on your PC, to close crashed programs and processes, and to check performance. You probably avoid a few processes whose names mean nothing to you, but they're essential to Windows. Portable Technology: Getting to Know the Treo Up until the recent past, those who wanted to take advantage of a mobile phone, data organizer, wireless e-mail with text messaging, web browsing and a digital camera had to have separate units for each. With today's technology comes the Treo - offering all of those features in one small hand-held unit. 4 Easy Ways to Speed Up A Sluggish PC Computers are supposed to speed up our productivity?to help us do more in less time. What do you do when your computer is running so slow that it's keeping you from getting your work done? Before you kick it to the curb, try these easy, do-it-yourself suggestions to help your system run & perform better. The Help Desk When you think of a help desk, what do you picture? Do you see a large desk with an elderly woman sitting behind it pencil behind the ear? Maybe it has a computer or two? Of course the person is smiling, but you know it's not going to be much help to talk to them. Now, transform this image to the computer help desk. Use Your Computer For Your Entertainment Needs By using your computer today you can find a lot of different music and movie programs. From downloading music and movies directly from the internet to buying subscriptions, joining clubs, and even renting, all from the comfort of your home. Cache In Your Chips And Get A Bus! Computer related terminology could sometimes be daunting to newcomers. These are relatively new words or hybrids of words, already in existence. Registry Tools Demystified Not sure what Windows registry is or how it works? Don't worry - there are tools that can take care of all registry related tasks for you, even if you are a seventy six year old who never used computer before. These are the tools that optimize your registry and make your PC run faster. Nephrology and Dialysis For a PDA Saving Lives With A Pocket PCFree medical downloads can be a real lifesaver for many people. For those dealing with diseases, using their pda to help monitor their health is one of the best and most useful benefits of the new pocket pc technology. Cisco Certification: A Survival Guide To The Cisco Cable Jungle One of the most confusing parts of beginning your Cisco studies is keeping all the cable types separate in your mind, and then remembering what they're used for. This often occurs when a CCNA or CCNP candidate starts putting together their own home practice lab, and they suddenly realize that they have the equipment to run labs, but not the cables. Basic Problem in a PC I have a p3 500MHz PC with 128MB RAM, 10.2 GB HDD Sony CD ROM 48x with window ME edition operating system. Why Using an Ad Blocker Can be a Bad Idea Ad Blocking is getting to be a common sport on the internet. Now there are some legitimate uses for an ad blocker. D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras Addressing a D2X Digital SLRCoolpix 8800 search, this article provides a quick comparison of the Nikon D2X digital SLR and Coolpix 8800 cameras.Nikon D2X Professional Digital SLRCheck out a Nikon D2X review or two and quickly realize this is a world class professional digital SLR. How to Use SQLXML to Retrieve Data from SQL Server Database? Using SQL Server 2000 and above versions you can retrieve data from SQL Server in XML format directly from the database. Many XML related features were incorporated in the SQL Server database. The Benefits of the New Firefox Browser You probably heard of the new Firefox browser version 1.0 recently released by Mozilla. If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough? I am going to assume that you are running windows xp on your machine, and you are the only user on this machine. That is right, no one else uses your computer except you. Healthy Webmasters Choose Ergonomic Computer Products Webmasters usually sit at their computers much longer in a day than most other office workers, sometimes up to 10 and 12 hours. This can bring about the potential for physical discomforts that are attributed to prolonged use and the repetitive tasks that they perform on computers every day. CCNA 640-801 Certification Primer The Cisco Certified Network Associate (CCNA) Certification is meant for career enhancement as well as gaining knowledge of the LAN/WAN technologies currently available for implementation. Hence, CCNA Certification can be obtained by IT professionals who have been a part of the industry for a considerable time and are interested in furthering their career in terms of role enhancement and salary. ![]() |
home | site map |
© 2006 |