Virtualizing x86 infrastructure isn't just a one-step process -- as servers change, the whole data center must change as well. While server hypervisors such as VMware's ESX, Microsoft's Hyper-V and Xen can make IT more efficient and cost-effective, m...
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a first look at this year's badge.
Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-pa...
While apologies from BP to the world regarding its environmental disaster and even from a U.S. Congressman to BP have stolen headlines of late, the tech industry has not been without its fair share of apologies during the first half of 2010 either.
In May, Web security consultant George Deglin discovered a cross-site scripting (XSS) exploit that involved Facebook's controversial Instant Personalization feature. The exploit ran on Yelp, one of the three sites that Facebook had selected to test I...
Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Whatever you use to surf the Web needs a fix. Developers of all five major browsers--Chrome, Firefox, Internet Explorer, Safari, and Opera--recently released important security patches.
Once upon a time, instant messaging was a consumer technology. That consumer toy worked its way into the corporate network and was eventually not just accepted, but embraced and leveraged as a valuable tool.
Last week a flawed DAT file from McAfee led to false positives crashing Windows XP systems and leading to a massive cleanup effort. It would be very easy to simply point the finger at McAfee, terminate the employment of a scapegoat security engineer ...
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
The last thing any of us need these days is another uninformed discourse on health care, but I tend to wade in where others have the common sense to keep out.
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say.
So far 2010 hasn't been kind to the Microsoft Internet Explorer Web browser. It is only March, and Microsoft is releasing the second emergency out-of-band patch to respond to a zero-day exploit in the wild.
A security researcher has published exploit code for the latest Internet Explorer zero-day flaw on the Web and Microsoft is warning that more attacks against the unpatched vulnerability can be expected in-the-wild. One thing seems to be more apparent...
Most Popular Reviews
- 1 Sony Xperia Z5 Premium review: Is the world ready for a 4K phone?
- 2 D-Link Taipan AC3200 Ultra tri-band modem-router review
- 3 BlackBerry Priv review: When old habits die hard
- 4 Dell XPS 13 (2016) review: Making the very best Ultrabook
- 5 Microsoft Surface Book review: The verdict on Microsoft's first notebook
Join the PC World newsletter!
Best Deals on PC World
Latest News Articles
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Google didn't abuse its position in Streetmap case, UK court rules
- New Chromebook won't break with 365-pound person standing on it
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- FTDigital Marketing Specialist | Media BuyerNSW
- CCContract Software Engineer (Crystal Report/JAVA) 160129/SE/vccAsia
- FTFraud AnalystVIC
- FTSenior Portfolio Manager - IT ProjectsNSW
- FTTechnical Consultant - Audio VisualSA
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCOracle Project OfficerSA
- CCInformation Security ManagerNSW
- CCSharePoint DeveloperACT
- FTIT Technical LeadVIC
- FTManual Software TesterNSW
- FTBusiness Intelligence AnalystVIC
- CCTechnical Lead - .NET TechnologiesACT
- FTInternal Audit ConsultantACT
- CCSolution Architect - .NET environmentACT
- CCJava DeveloperVIC
- CCHybris Developer - Global ConsultancyNSW
- FTIT Project ManagerSA
- CCSecurity Consultant/Analyst (Data Loss Prevention)WA
- FTSoftware Developer - Ruby on RailsNSW
- CCProject Manager IT infrastructureACT
- FTUX Front-End DeveloperWA
- FTNetwork Engineer | NV1 NV2 clearance | Defence projects | Immediate interviewACT
- FTNetwork EngineerNSW
- CCEXCEL Guru / Data AdministratorNSW