A 24-year-old law setting the rules on how law enforcement agencies can obtain electronic records needs to be updated because it's out of step with modern technology and privacy expectations, U.S. Senator Patrick Leahy said Wednesday.
Cisco has released its twice-yearly set of security updates for its switches and routers.
The emerging OAuth 2.0 Web API authorization protocol, already deployed by Facebook, Salesforce.com and others, is coming under increased criticism for being too easy to use, and therefore to spoof by malicious hackers.
<a href="http://www.networkworld.com/columnists/antonopoulos.html">Cloud computing,</a> especially <a href="https://www.networkworld.com/slideshows/2010/061510-cloud-security.html">public cloud</a> infrastructure-as-a-service is not yet a reality for...
The makers of the popular ZoneAlarm firewall, Check Point Software, have been accused of using scare tactics to get users to upgrade to the paid version of the software.
Security and compliance company ArcSight, which has been the subject of a takeover bid by HP, has upgraded its Enterprise Threat and Risk Management (ETRM) platform. The new version will include beefed-up ESM, the core analysis engine at the heart of...
A security flaw has made Twitter's website a chaotic and potentially unsafe place, filled with annoying pop-up windows that activate just by rolling the mouse over another user's tweets.
Linux is well-known for its security advantages over many other operating systems, but that doesn't mean it's immune to problems.
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
Microsoft's full-disk encryption feature is not being widely used, even where it is part of the Windows operating system, according to a new survey released by security vendor Opswat.
A serious bug that led to a series of fast-spreading worms on Twitter's website Tuesday had been fixed in August but was accidentally re-introduced.
Google has introduced a Transparency Report that lets you see which countries are asking the search company for data on its users and making requests for data removal.
The Information Commissioner's Office (ICO) has found East & North Hertfordshire NHS Trust in breach of the Data Protection Act after an unencrypted USB stick containing patient data was lost on a train.
A serious security flaw was apparently found on Twitter on Tuesday but was quickly fixed.
The European Commission has adopted a plan to limit third-country access to travelers' data and intends to use the plan in negotiations with the U.S., Australia and Canada.
Latest News Articles
- On snooping disclosures, AT&T and Internet companies are like night and day
- Yahoo buys concert live-streaming startup Evntlive
- Wall Street Beat: Tech stocks hit 13-year high
- DARPA makes finding software vulnerabilities fun
- Mobile chip speed wars have to end, Broadcom chairman says
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »