Dell on Tuesday announced a desktop workstation that acts like a server from which remote client PCs can exploit graphics processing capabilities.
The Business Centre
If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies, the head of the U.S. Department of Homeland Security said Monday.
The outage of Amazon's Elastic Cloud Compute (EC2) service has shone a light on the number of Websites that use the service, which allows companies to hire computing power inexpensively on Amazon's systems.
Windows 7 has expanded its lead over Windows Vista with more than 350 million licenses sold after 18 months on the market, Microsoft said Friday. But Windows XP, older than both Vista and 7, still captures about half of the desktop operating system m...
I bought a Blackberry PlayBook yesterday, but I'll probably return it.
Seattle police are investigating a group of criminals who they say have been cruising around town in a black Mercedes stealing credit card data by tapping into wireless networks belonging to area businesses.
Do you know what your employees are doing on the Web? At a minimum, they're probably goofing off watching YouTube videos. At worst, they could be steering your company toward financial ruin. In this quick guide, I'll show you how to keep an eye on em...
Verizon's just-released "2011 Data Breach Investigations Report" says businesses could prevent most data breaches if they stick to security principles that are cheap and easy to implement.
Criminals carried out more but smaller data thefts last year than in previous years, indicating a shift toward simpler exploits that run lower risk of punishment, according to Verizon's latest data breach report.
When it comes to IT, China likes to build big, whether it's the world's largest supercomputer or city-size complexes dedicated to cloud computing. Now, China is near to adding something else to its list of big tech things: the world's largest market ...
In a move that is unlikely to win it any new friends in the privacy community, Yahoo has announced that it will retain consumer search data for a substantially longer period of time than it does today.
Authorities in South Korea are probing a large system failure at a popular bank, trying to determine whether the incident was an error or a cybercrime that could be repeated elsewhere in the country where business leans largely on electronic transact...
When Google admitted last year that it had been targeted by sophisticated hackers, possibly from China, it introduced a new term into the high technology lexicon -- the advanced persistent threat. These attacks are sophisticated, targeted, and almost...
One day after a hacker posted screen shots and data to a hacking mailing list, saying he had broken into a New Mexico wind turbine facility, the company that runs the turbines says it has seen no evidence of a computer intrusion.
Claiming revenge for an "illegitimate firing," someone has posted screenshots and other data, apparently showing that he was able to break a 200 megawat wind turbine system owned by NextEra Energy Resources, a subsidiary of Florida Power & Light.
Most Popular Reviews
- 1 Sony Xperia Z3 review: The no-frills flagship
- 2 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
- 3 Samsung Galaxy Note 4 review: The busiest, biggest and best Samsung phablet
- 4 Aldi's $279 Bauhn Sphere review: Disappointing
- 5 Nokia Lumia 735 review: Perfectly ordinary
Best Deals on GoodGearGuide
Latest News Articles
- Tor, TrueCrypt, Tails topped the NSA's 'most wanted' list in 2012
- Google's Gmail appears to have been blocked by China at IP level
- 'The Interview' already Sony Pictures' top online film ever
- Sony: PlayStation Network is back online now, really
- Reports: North Korea's Internet access, mobile networks down
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.