Attorney-General, Robert McClelland, and Minister for Broadband, Communications and the Digital Economy, Senator Stephen Conroy, have backed a standing committee report on cyber crime.
A conservative MP has called for UK Internet service providers to protect youngsters by introducing an age-rated opt-in system for online porn.
After 11 rounds of international negotiations, the final text of the controversial Anti-Counterfeiting Trade Agreement (ACTA) has overcome its biggest hurdle yet when it was welcomed as a step in the right direction by the European Parliament, which ...
Google has begun testing an intriguing plugin for Microsoft Office. Google Cloud Connect is a devastatingly simple concept: rather than save your files to your computer's hard disk, it allows you to save them to your online Google Docs space.
Enterprise software provider SAP is stepping up its security stance as its once-isolated systems become increasingly connected to the Internet, posing new risks as hackers diversify their targets.
Apple has finally released the highly-anticipated iOS 4.2. While the attention around iOS 4.2 has been focused on the enhancements and new features -- particularly for the iPad, the update also fixes more than 80 vulnerabilities in the iPhone, iPod, ...
With its pending US$2.2 billion purchase of Novell, Attachmate is acquiring a rich portfolio of technologies. The next step will be actually putting these riches to work, analysts said Monday.
Apple today patched 27 vulnerabilities in Safari for Mac OS X and Windows, 85 per cent of them critical bugs that could be exploited to hijack Macs or PCs.
Microsoft on Wednesday patched an enterprise security tool that had blocked some copies of Chrome from updating.
China's largest fixed-line phone carrier has denied it hijacked worldwide Internet traffic this past April following a U.S. government report that said the company had redirected network routes through Chinese servers.
One in five employees is putting their company's network atrisk by using non-standard smartphones in breach of their organisation's security policy.
McAfee today revealed its McAfee Threat Report for the third quarter of 2010. Information like that provided by McAfee in these quarterly reports is valuable for IT admins -- enabling them to keep a finger on the pulse of malware, and to stay in touc...
Passwords are the predominant means of securing sensitive data, and that is why there are established best practices defining password policies. Sadly, though -- the most critical data is often less secure because Admin passwords function outside of ...
Dell Wednesday announced its first endpoint encryption product, along with the possibility of factory installation on certain Dell PCs.
Latest News Articles
- Brother MFC-J6920DW multifunction centre
- Vodafone now selling 4G-enabled Samsung Galaxy Ace 3
- Telstra now selling Samsung's new Galaxy Note 10.1
- Xbox One sets Aussie sales record
- Google launches white Nexus 7, but not for Australia
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 How do I connect my TV to the Internet?
- 4 Windows 7 Home Premium vs. Windows 7 Professional
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »