When federal agents announced on November 29 that they'd indicted or convicted eight individuals accused of using botnets (networks of computers infected with Trojan horse applications) to engage in criminal activity, the press release barely explain...
Will 2008 see the first serious security exploit in corporate VoIP networks? Or will network security breakdowns cast a pall on the upcoming presidential elections and Olympic games? Will users' Web 2.0 forays open the malware floodgates?
You can forget inventions like air conditioning, television, the computer and the Internet. The single most important invention of the 20th century was the transistor, according to some researchers and analysts.
Another round of business travel is upon me all too suddenly, so I'm loading my video iPod as I frantically throw jumbles of clothing into a suitcase. It's easy to rip digital files from my CD collection, which is why I have 25GB of music loaded in s...
First, the data center dialed back its power consumption. Now it's the front office's turn.
Virtualization could hardly be hotter as a trend, yet virtualization management and security tools are still in their infancy. At first glance, it defies logic.
Over the past few months, Computerworld has reviewed the latest in hard disk drive technology, from large-capacity 1TB models and energy-efficient "green" drives to solid-state disks that outpace their spinning disk counterparts on every dimension of...
This year has been a time of realignment and redefinition, as Apple launched its second zeitgeist-defining product of the new century, Dell and Intel battled to regain their former dominance, the software sector consolidated, Google rallied industry ...
With major OEMs arguing about who recycles the most electronics and with e-waste legislation on the rise across the world, green computing is a hot topic. However, many companies are still in the dark about how to properly get rid of old IT equipment...
What good is a browser unless you can tweak it, hack it and bend it to your will? No good at all. The more you can hack it, the better it is. And that means that Firefox must be a great browser. It's infinitely customizable, via editing a text file c...
Auditing firewalls to keep regulators happy and tracking rule changes - especially for businesses buying firewalls from multiple vendors - is a burden that a variety of third-party software can lighten dramatically.
The rise of customized malware is forcing security software vendors to change their tactics quickly and begin using customers' machines as their initial line of threat detection intelligence, according to a new report from Yankee Group.
How bad was 2007 for breaches, vulnerabilities and similar mayhem? On the bright side, it was better than 2008 is forecast to be. With more of every sort of meltdown predicted -- more criminalization of the hacker community, more Web-application atta...
Some of high tech's biggest names - Microsoft, HP and Intel among them - are starting to embrace a technology called network coding in an effort to boost throughput, scalability and efficiency of everything from content distribution to wireless netwo...
Server virtualization feels unstoppable these days. The worldwide market for virtualization platform software grew 69% last year to US$1.1 billion, according to market research firm IDC, which predicts average annual growth of 27% through 2011, when ...
From corporate to connected lifestyle
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Low-end Android phones could get VR with new Imagination GPU
- Twitter's Vine dies today, so download your videos pronto
- Nvidia's new Shield TV launches with HDR support, and connected home smarts on deck
- This Wi-Fi alternative rides on LTE rails
- Baidu names former Microsoft Office head Qi Lu as its COO
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- CCProject SchedulerNSW
- FTService Delivery Manager - EnterpriseACT
- CCWebMethod DeveloperVIC
- FTSolutions Architect - Data Centre/ NetworkQLD
- CCProject ManagerNSW
- CCIT Solutions ArchitectQLD
- FTCheckpoint Firewall and VPNNSW
- TPDigital Business Analyst | AgileQLD
- TPProgram ManagerNSW
- FTTechnical Account ManagerNSW
- TPData Analyst - Business IntelligenceQLD
- TPNetwork Security OfficerVIC
- FTJava DeveloperSA
- FTSystems AdministratorVIC
- TPAnsarada Data Room AdministratorNSW
- CCSAP UX ArchitectACT
- CCTest AnalystQLD
- FTService Desk Analyst / Security EngineerQLD
- TPIT Sercurity EngineerVIC
- FTFront End UI DeveloperQLD
- CCIT Risk Specialist (Assurance) - TelcoVIC
- TPProject Manager - SAPQLD
- FTLevel 2 Service DeskNSW
- FTTest Analyst - HealthcareVIC