Auditing firewalls to keep regulators happy and tracking rule changes - especially for businesses buying firewalls from multiple vendors - is a burden that a variety of third-party software can lighten dramatically.
The rise of customized malware is forcing security software vendors to change their tactics quickly and begin using customers' machines as their initial line of threat detection intelligence, according to a new report from Yankee Group.
How bad was 2007 for breaches, vulnerabilities and similar mayhem? On the bright side, it was better than 2008 is forecast to be. With more of every sort of meltdown predicted -- more criminalization of the hacker community, more Web-application atta...
Some of high tech's biggest names - Microsoft, HP and Intel among them - are starting to embrace a technology called network coding in an effort to boost throughput, scalability and efficiency of everything from content distribution to wireless netwo...
Server virtualization feels unstoppable these days. The worldwide market for virtualization platform software grew 69% last year to US$1.1 billion, according to market research firm IDC, which predicts average annual growth of 27% through 2011, when ...
Dell's efforts to reinvent itself this year through a dramatic break from its direct-sales model, expanded services and new enterprise offerings have shown positive early results, but some users have lingering concerns about supply chain management a...
Cisco made 11 acquisitions this year culminating in 126 purchases since Cisco's birth. It made three more acquisitions than it did last year, when it spent a measly US$256 million buying ho-hum technologies. This year was different, not only in the s...
The past year may have been a wireless dream come true if you're a fan of the iPhone and more open handsets and networks, but it was a nightmare for some major new alternatives to traditional mobile services.
There's a new weapon in the security arsenal that monitors network traffic and issues real-time alerts when it spots unusual or suspicious behavior on the network.
Ubiquitous, fast and cheap wireless access for mobile users has been predicted annually for more than 10 years. Will we finally realize that dream in 2008?
What makes a top newsmaker? Sometimes a company generates lots of buzz by doing particularly innovative things, or someone with a catalyzing personality gains notoriety. Other times a hot new product or a spectacular disaster gets the attention of th...
High drama enveloped social networking companies during 2007 as they pursued significant opportunities and stumbled over mighty obstacles.
When we tested firewall performance as part of in our UTM firewall test we focused on how well the products would push inspected packets along with other UTM features, specifically intrusion-prevention systems and antivirus, turned on. However, many ...
Although data encryption adds cost and complexity, business and government sectors are becoming wedded to it -- even though at times it's like an arranged marriage driven by regulatory compliance and fear of data-breach fiascos.
Some topics always seem to remain relevant no matter what new technologies develop.
You can’t just rush out and buy the most expensive hard disk and expect it to be the best at fulfilling all your needs. Different hard disks are designed for different uses and if you buy the wrong one you’ll either waste a lot of money or find that it simply won’t work with your chosen task. Here we list the top 10 things to look out for when you buy a new hard disk, whether it’s for a laptop, desktop, Networked Attached Storage (NAS) device or a server in a data center.
Most Popular Reviews
- 1 Hisense Series 7 ULED 4K UHD TV review
- 2 Samsung Galaxy Note 7 review
- 3 Portable power: Venom Blackbook 13 Zero review
- 4 Alcatel Idol 4S review: King of the mid-range?
- 5 Samsung Galaxy S7 Edge Review
Join the PC World newsletter!
Latest News Articles
- Armies of hacked IoT devices launch unprecedented DDoS attacks
- Illusive Networks seeks to slow Swift attackers through deception
- Microsoft continues pushing hybrid cloud with new launches
- These new features in Office 365 can help users work smarter
- Here's how Microsoft is using containerization to protect Edge users
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCTechnical Architect/DesignerACT
- FTOutbound TelesalesVIC
- CCICT Security AuditorACT
- CCDesktop Infrastructure SpecialistACT
- FTIT Pre-Sales EngineerSA
- CCJava / J2ee ProgrammersACT
- CCVideo Conference Support Officer- VoIP, LAN, WAN, RemedyNSW
- CCSenior Project ManagerACT
- CCNetwork and Security EngineerNSW
- FTJava DeveloperNSW
- FTSenior Project Manager | TelecommunicationVIC
- FTOutbound TelesalesVIC
- FTTechnical Business Analyst | Marketing ServicesNSW
- CCSecurity Cleared IT Professionals - Expression of InterestSA
- FTPositive Vetted ICT positions - Defence intelligence and information securityACT
- CCBusiness ArchitectNSW
- CCBI Reporting AnalystACT
- CCNetwork Design Specialist - TelecommunicationsNSW
- FTDesktop/Application SupportVIC
- FTBackup ConsultantWA
- FTOutbound TelesalesVIC
- CCSenior Business Analyst -Change and SAP ProcurementNSW
- FTTest SpecialistSA
- CCProgram Manager - Data InsightVIC
- FTSenior PHP DeveloperNSW