Virtualizing x86 infrastructure isn't just a one-step process -- as servers change, the whole data center must change as well. While server hypervisors such as VMware's ESX, Microsoft's Hyper-V and Xen can make IT more efficient and cost-effective, m...
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...
While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.
In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...
Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Whatever you use to surf the Web needs a fix. Developers of all five major browsers--Chrome, Firefox, Internet Explorer, Safari, and Opera--recently released important security patches.
Once upon a time, instant messaging was a consumer technology. That consumer toy worked its way into the corporate network and was eventually not just accepted, but embraced and leveraged as a valuable tool.
Last week a flawed DAT file from McAfee led to false positives crashing Windows XP systems and leading to a massive cleanup effort. It would be very easy to simply point the finger at McAfee, terminate the employment of a scapegoat security engineer ...
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
The last thing any of us need these days is another uninformed discourse on health care, but I tend to wade in where others have the common sense to keep out.
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say.
So far 2010 hasn't been kind to the Microsoft Internet Explorer Web browser. It is only March, and Microsoft is releasing the second emergency out-of-band patch to respond to a zero-day exploit in the wild.
A security researcher has published exploit code for the latest Internet Explorer zero-day flaw on the Web and Microsoft is warning that more attacks against the unpatched vulnerability can be expected in-the-wild. One thing seems to be more apparent...
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 B&O BeoPlay A2 portable Bluetooth speaker
- 3 Acer Chromebook 11 (CB3-111)
- 4 Asus Zenbook UX303LN Ultrabook
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- MIT unifies Web development in a single, speedy new language
- Google, Microsoft, Sony make 'The Interview' available online
- Experts: FCC will adopt net neutrality rules in early 2015
- Romanian version of EU cybersecurity directive allows warrantless access to data
- Rackspace DNS recovers after DDoS brings system down
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.