If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss...
Meetings, conferences and training programs in a 3D virtual world such as Second Life can be more engaging and productive than traditional online sessions and phone calls, and much less expensive than face-to-face meetings requiring travel. But some ...
The business benefits of a cloud computing model have been well stated. You cut costs by switching to more flexible on-demand IT resources that can better handle the ebb and flow technology needs at a company.
A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards.
The second version of the Payment Card Industry (PCI) Data Security Standard (DSS) is being released this afternoon by the organization PCI Security Standards Council, which sets the network and security requirements for merchants and service provide...
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless th...
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment.
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions. One that always comes up: Were the systems' disks fully encrypted?
An Italian prosecutor has accused Google of violating Italian and European regulations in the way it handles its e-mail communications, the Corriere della Sera newspaper reported Monday.
Oracle licensing consultant Eliot Arlo Colon still remembers the enormous global publishing company that was "so darn confident" it would breeze through an upcoming software license audit unscathed.
EMC Wednesday announced plans to acquire Configuresoft, a maker of server configuration, change and compliance management software, for an undisclosed sum.
Latest News Articles
- Nokia Lumia 1520 Windows Phone
- ITU standardizes 1Gbps over copper, but services won't come until 2015
- Internet companies dismayed by French law allowing warrantless access to live user data
- Rules that carriers must retain data called incompatible with EU law
- Imation 2-in-1 Micro USB Flash drive for Android
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »