In today’s day and age we see a huge amount of excitement around finding the biggest and best presents for kids. Not only this, children are encouraged to surf the web and use mobile apps from a young age. We are seeing toddlers trading toy cars and ...
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the A...
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "br...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it...
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds...
Students at a U.S. military graduate school in California are mining social media with new methods that may change the way the armed forces collect intelligence overseas.
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for ...
Both Google's and Apple's mobile platforms have security drawbacks and advantages. Is there a clear winner?
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- Sony Xperia X Performance review: Sony’s most disappointing product in years
- 802.11ac Wi-Fi gear driving strong WLAN equipment sales
- Microsoft declares 350M devices now on Windows 10
- Facebook chooses friends and family over celebrities in your feed, which is probably healthy
- Florida man sues Apple for $10 billion for 'stealing' his iPhone invention from 1992
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCSharePoint DeveloperSA
- FTLead Tableau Reporting ConsultantNSW
- CCSolution DesignerACT
- CCContract Programmer (IT Security/Website Admin) 160617/P/564Asia
- CCScrum Master with Java development backgroundACT
- CCJunior PM/ConsultantACT
- FTTechnical Consultant - ServerSA
- FT.Net Developer (WebAPI / Entity Framework / SQL Server)NSW
- FTBusiness Analyst/Data Analyst Capability ManagerVIC
- FTService Delivery Coordinator - ApplicationsNSW
- CCContract Junior Programmer (JAVA / SQL) 160621/JP/224Asia
- CCAgile Business AnalystNSW
- FTSolution Architect - Data/ InformationVIC
- CCWeb Developer (Drupal)SA
- CCData ArchitectSA
- CCContract Systems Analyst (Linux/MySQL/Oracle) 160630/SA/254Asia
- CCTechnology and Security ArchitectACT
- FTSystems EngineerNSW
- FTTableau BI DeveloperNSW
- FTSenior Network Engineer JUNIPERNSW
- CCSAP PI/PO ConsultantVIC
- CCProgram Controls ManagerACT
- FTContract System SpecialistAsia
- CCData Warehouse Specialist- Power BI, SSAS DBA, Azure, SQLNSW
- CCNational Project CoordinatorNSW