From flying cars to portable alarm systems, here are our picks for the best pieces of wizard tech we wish we could take with us.
Reviews & Features
How to Strengthen Your Twitter Security in Four Clicks
As the team at Fox News discovered—to its chagrin—earlier this week, security lapses on social networks can have wide-ranging consequences.
As we reported, persons unknown took control of the Fox News Politics Twitter feed in the early hours of July 4th, and started trying to spread rumors that the president had been …
The Tragic Decline of BlackBerry
Ben Bajarin is the Director of Consumer Technology Analysis and Research at Creative Strategies, Inc, a technology industry analysis and market intelligence firm located in Silicon Valley.
Research In Motion (RIM), makers of the venerable BlackBerry devices, will always be remembered as the company who liberated corporate email from …
Two Minute Video: Stress Testing a Military-Grade Tablet
The iX104C5 tablet from Xplore Technologies is built for extreme conditions, but how does it fare against life in suburbia?
Want more videos like this one? Click here…
How to Disguise Facebook as a Common Spreadsheet
You work, right? And are you on the Facebook? Seems everyone’s on the Facebook. That thing’s probably going to “make it” in the tech world.
Your superiors may not appreciate you spending company time on Facebook, preferring instead that you buckle down and churn through those spreadsheets. But what if you’ve already churned through …
Why Competing with Apple Is So Difficult
Ben Bajarin is the Director of Consumer Technology Analysis and Research at Creative Strategies, Inc, a technology industry analysis and market intelligence firm located in Silicon Valley.
The desire to compete with Apple is widespread among many companies in the tech sector. The problem is that very few, if any at all, are well …
HP Is Committed to Its ‘WebOS’ Platform (and It Should Be)
Ben Bajarin is the Director of Consumer Technology Analysis and Research at Creative Strategies, Inc, a technology industry analysis and market intelligence firm located in Silicon Valley.
As a technology consulting firm, our company has had the opportunity to work with most of the vendors in the PC market and for most of the last …
Two Minute Video: How to Create Strong Online Passwords
Heard about any good hacks lately?
It’s high time we went over some password rules:
1. The longer the better. Six characters? No. Eight? Meh. Twelve? Yes.
2. Use a combination of uppercase, lowercase, numbers and symbols.
3. Create a different password for each site. It’s a total pain, I know, but consider one of the …
Violent Video Games: The Top 8 Big Money Franchises
In observance of the Supreme Court’s 7-2 decision to treat video games to the same First Amendment protection as art, music, and movies, here’s a look at some of the biggest names in violent game franchises.
You may want to cross-reference this list with the games your children already own, or just be on the lookout for any of these …
Why Tablets Represent the Future of Computing
Where is personal computing headed?
As a technology industry analyst I get asked this question quite often. My answer, although it’s hard to wrap our brains around now, is that we are moving away from a keyboard- and mouse-centric computing experience to a touch computing experience. Tablets represent the beginning of that shift and …
Two Minute Video: Turn Your iPad into an ’80s Arcade Machine
I’ll show you how to build your own arcade cabinet for use with your iPad. Then when that doesn’t work, I’ll show you where to order one. Enjoy!
Want more videos like this one? Click here…
Cyber Vigilantes Claim to Have Unmasked LulzSec Members
Several “gray-hat” hackers are mounting an effort to unmask the persons behind Lulz Security, the group responsible for a rash of brazen attacks and breaches over the past month.
Among the cyber vigilantes are The Jester (a.k.a. Th3j35t3r), a self-described ex-military gray-hat hacker who has previously attacked Wikileaks and …