Despite being a pioneer in tablet PCs, Microsoft has failed to translate its ambitions into a successful slate-computing strategy.
Perhaps there is finally something to deter <a href="http://www.chatroulette.com/">Chatroulette.com</a> users from their more offensive behavior: University researchers say that users of the popular video-chat site may not be as anonymous, or as priv...
Facebook users in the UK can now add a "panic button" onto their profiles to report and prevent malicious behavior such as cyber-bullying and sexual harassment.
In recent years, requirements for effective information technology governance programs have increased.
A surge in third-party software vulnerabilities accounted for the bulk of a ballooning bug count in the first half of 2010, said Danish security firm Secunia today.
BlackBerry-maker Research In Motion (RIM) today took the wraps off its latest offering for consumers, BlackBerry Protect, a free service meant to help non-corporate BlackBerry users secure and manage their smartphones.
Oracle on Tuesday will release 59 patches to fix security weaknesses affecting hundreds of products, according to <a href="http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html">a notice</a> on its Web site.
Java development has supplanted IT security as the most difficult skill set for hiring managers to locate.
Could it be that Americans are starting to grow a bit weary of Facebook, which has captivated our attention and much of our free time?
The Beijing government's decision to renew Google's license to do business in China could be a big step in a long process of negotiations between Google and China to find a way to coexist.
Panda Security researchers solved the mystery of the 32-character code in the inner gold ring of U.S. Cyber Command's logo.
Facebook faces a fine from a German privacy regulator for failing to obtain the consent of the people whose contact details it stores.
Someone hacked the list of attendees for the recent Cisco Live 2010 users' conference, a security breach that led Cisco to notify the customers as well as a broader group who have dealings with the company.
Use Pirate Bay to find or swap files? If so, about 4 million of you have just had your accounts hacked and user names, e-mail and Internet addresses compiled by a 23-year-old Argentinian (and two pals) exploiting the site's SQL vulnerabilities.
It's unlikely that consumers' iTunes accounts were hacked by a Vietnamese iPhone developer, a security researcher said today.
Latest News Articles
- On snooping disclosures, AT&T and Internet companies are like night and day
- Yahoo buys concert live-streaming startup Evntlive
- Wall Street Beat: Tech stocks hit 13-year high
- DARPA makes finding software vulnerabilities fun
- Mobile chip speed wars have to end, Broadcom chairman says
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- TabletsView all »
- NotebooksView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »