The late Internet pioneer Jon Postel (1943-1998), among others, developed the Simple Mail Transfer Protocol (SMTP) in 1982 that is still used today for Internet mail communications. But I'm sure Postel would be turning over in his grave if he could ...
Some day the IEEE will get around to finalizing the 802.11n standard that it began working on in 2003. That some day was supposed to be 2006. Then 2007. Then 2008. Maybe, the standard will be finalized in 2009. Maybe 2010.
When it comes to hot buzzwords, nothing comes close to Web 2.0. Nobody knows exactly what it means but everybody uses it. In fact, at Network World we've started getting press releases referring to Web 3.0.....whatever that is.
The Web has been in 2.0 mode for a while now, and in-car tech is starting to follow suit.
After a rocky start, the latest flavor of wi-fi, 802.11n, should come into its own this year, with prices for new equipment coming down significantly and lots of options for sale to add 802.11n technology without getting rid of your older gear. And n...
How bad was 2007 for breaches, vulnerabilities and similar mayhem? On the bright side, it was better than 2008 is forecast to be. With more of every sort of meltdown predicted -- more criminalization of the hacker community, more Web-application atta...
There's a new weapon in the security arsenal that monitors network traffic and issues real-time alerts when it spots unusual or suspicious behavior on the network.
High drama enveloped social networking companies during 2007 as they pursued significant opportunities and stumbled over mighty obstacles.
When it comes to the "next big thing," I'm usually pretty skeptical. (It's from all those years I've spent trying to get gear to work as advertised.) But in 2008, we will see some long-promised technologies--like the connected home, truly smart "smar...
Far from being a major player in IT security today, Google has ambitious designs on becoming a big name in the burgeoning hosted security market, begging the question, Will your organization ever be ready to let the world's largest information retrie...
"Blended threats" - online security attacks that combine several techniques - are likely to become more pervasive in 2008, security industry insiders say.
In all the marketing blather about Amazon.com Inc.'s awesome new Kindle e-book reader, you won't hear "e-mail," "RSS feeds" or "online calendars" mentioned at all.
When Constellation Energy Group's commodities group needed a new system recently, it considered the usual sources of labor: internal staff, a consultant, a contractor, offshore programmers or a mix of all four. Instead, it turned to a somewhat less t...
A little over a year ago, social networking site Facebook opened its doors to nonstudents, and since that time, businesspeople and the computer-savvy have flocked to it. A big reason for the site's allure is not just the number of people who use it, ...
There's no question that blogs are multiplying in cyberspace. Now they're infiltrating businesses, too, even if the IT departments haven't sanctioned their implementations.
Most Popular Reviews
- 1 Playing chicken with a Tesla Model S
- 2 Audi TT (2015) review: A smarter take on the sports coupe
- 3 Microsoft Lumia 640 review: Honouring Nokia's legacy
- 4 Apple Watch review: saving time
- 5 Samsung SUHD smart TV (JS9500) review
Join the Good Gear Guide newsletter!
Deals on Good Gear Guide
- Networking, Wireless & VoIP
Deals on Good Gear Guide
Latest News Articles
- Families can pool data with Optus' aggressively priced smartphone plans
- iiNet hit with $204,000 ACCC fine
- BitTorrent starts producing original TV shows in a quest to reform its image
- Optus fends off Foxtel triple play with discounted Internet bundles
- ‘Backbone’ to NBN Co’s regional Internet network completed
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.