The Federal Communications Commission's new approach to dealing with white spaces spectrum has gone from "proceed with utmost caution" to "if a channel looks open, use it."
Panasonic has developed a hair-washing robot that uses 16 electronically controlled fingers to give a perfect wash and rinse, the company said Friday.
TAMPA -- The U.S. military is taking cloud computing into rugged terrain in Afghanistan, where according to Lt. Gen. Richard Zahner, the basic hardware and software technology is being packed into mobile boxes that later this year will start to play ...
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
Google has introduced a Transparency Report that lets you see which countries are asking the search company for data on its users and making requests for data removal.
The Wall Street Journal just published the sixth article in its excellent series about Internet privacy, or the lack of it.
A database security vendor says colleges and universities need to do more to secure their databases against break-ins.
Cisco plans to pay a dividend to shareholders for the first time in its history.
A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens.
Microsoft will hire a law firm to conduct an independent investigation into whether its anti-piracy practices helped fuel the stifling of political dissent in Russia, and will create a new software license to protect non-government organizations "fro...
The National Science Foundation (NSF) has doled out grants worth up to $US32 million in total to a pack of universities dedicated to rethinking everything about the Internet from from its core routing system to its security architecture and addressin...
The mastermind behind one of the biggest hacking paydays in history has been sentenced to four years' probation and an $US8.9 million fine, according to published reports.
VMware customers attending VMworld are taking a look at Microsoft's Hyper-V virtualization software, but say the Microsoft technology falls a bit short and that it would be problematic to start over after investing heavily in VMware.
Nearly five months after the iPad's launch, Apple has finally matched supply with demand.
The most significant breach of U.S. military computers ever was carried out in 2008 by W32.SillyFDC, a low-level-threat worm that got into the network via a thumb drive plugged into a military laptop.
Latest News Articles
- It's the little things that matter in Amazon Redshift upgrade
- Google AdWords cleared in geotagging patent lawsuit
- China's Xiaomi targets ten markets in international expansion
- Toshiba, SanDisk NAND flash memory shrinks to 15-nanometer process
- Bing for schools out of pilot stage, promises ad-free search
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Windows 7 Home Premium vs. Windows 7 Professional
- 3 Laser vs. inkjet printers: which is better?
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- 5% off $949 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »