President Barack Obama's administration is pushing two potentially controversial Internet policies in a secretive trade pact, with trade negotiators calling for other countries to adopt net neutrality provisions while rejecting policies requiring loc...
A so-called spearphishing attack on ICANN has compromised the email credentials of several ICANN staff members and allowed the attacker access to user information, including email and postal addresses.
Google is making progress developing a user-friendly tool for fully encrypting people's messages on their computers, with coding help from Yahoo and a transition to GitHub.
The hackers who attacked Sony Pictures have apparently moved on to a new tactic: attempting to spread fear among the general public.
From rattled airline passengers who fear the coming of smartphones to jurors who don't know a smartphone from a tablet, here are some of the colorful quotes from IT news in 2014.
A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems.
Researchers in the Netherlands are applying quantum physics in an attempt to create fraud-proof credit cards and ID cards.
U.S. Senator Al Franken isn't satisfied with Uber Technologies' response to privacy questions he asked the ride service.
An Illinois hospital says someone attempted to blackmail it to stop the release of data about some of its patients.
The hackers who stole gigabytes of data from Sony Pictures have asked employees of the company to contact them if they don't want their information to become public.
The U.S. Department of Justice should back off its request for Microsoft to turn over a suspect's digital documents stored on a server in Ireland, or be prepared for other governments demanding documents stored on U.S. servers, the company's general ...
Android apps really do use those permissions they ask for to access users' personal information: one online store records a phone's location up to 10 times a minute, French researchers have found. The tools to manage such access are limited, and inad...
After Sony Pictures Entertainment's computer network was breached in late November, it appeared the hackers wanted to blackmail the company.
If Google doesn't change how it handles users' private data by the end of February, it may face fines of €15 million (about US$18.6 million), the Dutch Privacy Authority said Monday.
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 Acer Chromebook 11 (CB3-111)
- 3 Asus Zenbook UX303LN Ultrabook
- 4 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 5 Lenovo Yoga 3 Pro hybrid Ultrabook
Best Deals on GoodGearGuide
Latest News Articles
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Three ways enterprise software is changing
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Companies battle for control of Italy's national fiber network
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.