Microblogging on Twitter is great. But sometimes you're just too busy to sit down and type that 140-character tweet. Maybe you're climbing a volcano, sprinting through the airport or running a marathon and just can't stop to type. Here's how to post ...
Leetspeak, Internet shorthand, computer jargon for instant messaging -- whatever you call them, initialisms like BRB, LOL and BTW have now entered the public lexicon. (I know a few teenagers who actually say LOL to each other in person!)
Like a Brachiosaur sinking into a tar pit, the recording industry as we've known it for the past 70 years is very nearly extinct. But unlike dinosaurs, the RIAA is trying to drag everyone else into the pit with it.
Business cards are as obsolete as fax machines. And like fax machines, business cards have us still using paper to move electronic data from one digital system to another.
The world's richest and most powerful 10-year-old says it can handle far more of your technology needs than you think. Google started almost exactly 10 years ago, and it is making big noise about invigorated Apps and some Googlers called to tell me a...
Naked home workers may be the stuff of fantasy, but flexible working is now a corporate reality. Ready availability of broadband combined with the reliability and speed of wireless communications has transformed home and remote working.
I did it yesterday. Not that I was trying, mind you -- honestly, I wasn't. I did, however, predict it would happen, so I'm going to take this opportunity to gloat about that.
For a technology that has been in stable release since May 22, 2000, PHP 4 has finally reached the end of its official life. With the release of PHP 4.4.9, official support has ended and the final security patch for the platform issued.
By and large we have all gotten used to spam and unsolicited commercial e-mail (UCE). Even if you buy or build the best filters, if you are at all active online you're going to get at least a few spam messages every day. It has become one of those th...
Here's a travel advisory: The next time you find yourself in a foreign city at night with nothing to do, take my advice: rent a movie in your hotel room. Don't go to discos. And if you do go out, don't bring a smart phone with you.
Security company Finjan Wednesday reported it has found more than 1,000 sites infected by an attack toolkit called "Asprox," which exploits discovered flaws in a vulnerable site's programming to add hidden attack code. The attack code in turn search...
A while back, I wrote about the concept of social networking. The upshot: Although the wisdom of crowds may be overhyped, the phenomenon of social networking isn't.
There's an old show-business joke about a play that is failing. A potential theatergoer calls the box office to find out when the show starts, and the ticket agent responds, "How soon can you get here?"
Mozilla has touted Firefox 3 as faster and more secure than earlier versions of the open-source web browser. But there's another reason to look at the browser upgrade: it is highly customizable for individual users by utilizing the massive library of...
When determining the risk to a system and the data stored on it, insider threats are generally regarded as lower risk. Despite the complete access (high risk) that insiders generally have, most of the time insiders are trusted agents (very low risk)...
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- NIST pledges transparency in NSA dealings over crypto standards
- North Carolina could be next in Google Fiber roll-out
- Conference calls a waste of time? In 1915, this one made history
- Box rides high on Wall Street’s warm welcome
- China tightens Internet control by blocking VPN services
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.