TechDay Australia - Australia's technology news network

Tablets & laptops stories - Page 53

Among the most popular devices in the corporate and arguably home environment, laptops and tablets are the weapon of choice for most computing tasks. Dominated by Microsoft and its Windows operating system, laptops are produced by a wide number of manufacturers and typically feature purpose- designed processors from Intel or AMD; tablet computers are similar to laptops but lack a dedicated keyboard and are often ‘stripped down’ with lighter weight and somewhat reduced capabilities. Windows’ domination as an operating system has not extended to tablets, which typically run Android or Apple’s iOS.
Story image
Lenovo DCG to launch new edge server similar in size to a laptop
Sat, 23rd Feb 2019
#
datacentre infrastructure
#
hyperscale
#
edge computing
The company has unveiled its new server which is a result of its continued investment in solutions supporting IoT and edge computing.
Story image
Surprises and highlights from Samsung's Unpacked launch event
Thu, 21st Feb 2019
#
smartphones
#
personal computing devices
#
samsung
The event features devices that are Samsung's answer to skeptics who say everything that can be done has already been done.
Story image
New Genesis trust hoped to drive STEM inspiration in schools
Thu, 21st Feb 2019
#
datacentre infrastructure
#
power / energy
#
cleantech
The trust will provide relevant equipment to New Zealand schools in the hopes that it will inspire students’ interest in STEM and renewable energy.
Story image
Samsung previews the new Galaxy Tab S5e
Tue, 19th Feb 2019
#
smartphones
#
gaming
#
digital signage
Samsung’s latest iteration of its popular Galaxy tablet, the Tab S5e, seems to showcase that it is actually possible to be larger and lighter.
Story image
University tackles multi-campus AV streaming challenge
Thu, 7th Feb 2019
#
edutech
#
digital signage
#
personal computing devices
Pro AV Solutions Queensland and avt deployed a network media solution to deliver streaming across multiple University of Southern Queensland campuses.
Story image
Ziften extends proprietary AI/ML security across all endpoints
Thu, 7th Feb 2019
#
endpoint protection
#
edr
#
ai
Ziften deploys advanced proprietary AI and ML to enhance security across all endpoints, offering robust protection for Windows, macOS, and Linux systems.
Story image
Hands-on Review: Kano Computer Kit
Fri, 1st Feb 2019
#
gaming
#
digital entertainment
#
open source
Kano’s Computer Kit Complete gives you everything you need to build a functioning Raspberry Pi-based laptop computer.
Story image
Being BYOD ready: How to future-proof for digital curriculums
Thu, 31st Jan 2019
#
edutech
#
network infrastructure
#
sdn
Connection numbers and the demand per device is growing exponentially in education instiutions. How can a school be ready for what’s to come?.
Story image
Digital divide anxiety as school year looms
Wed, 23rd Jan 2019
#
edutech
#
personal computing devices
#
digital divide
As technology in the classroom becomes a necessity, many children could be starting at a disadvantage as the financial strain becomes too much.
Story image
LG takes home over 140 awards at CES
Tue, 22nd Jan 2019
#
digital signage
#
displays & projectors
#
personal computing devices
Including Engadget Best of CES Award in TV category for fifth consecutive year for the LG Signature OLED TV R.
Story image
Lenovo invests in ePaper company in bid to revive tablets
Mon, 21st Jan 2019
#
digital signage
#
displays & projectors
#
personal computing devices
As the tablet market declines, Lenovo is making an investment in CLEARlink in order to create a low-power, colour, outdoor-ready display.
Story image
Stepping up to sell security services in ANZ
Wed, 16th Jan 2019
#
firewalls
#
network infrastructure
#
network security
WatchGuard Technologies ANZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Story image
How to tackle cyber threats in your home
Tue, 15th Jan 2019
#
firewalls
#
network infrastructure
#
network security
How should you start securing your devices? The company has provided tips for actions you can take across social media, home routers, TVs, and many more.
Story image
Acer’s new top tech gaming notebooks
Mon, 14th Jan 2019
#
gaming
#
digital entertainment
#
personal computing devices
Predator Triton 900 features a convertible 4K display and the new NVIDIA GeForce RTX 2080 GPU, and the 500 is just 18mm thick.
Story image
Why NVMe is headed for the mainstream this year
Mon, 7th Jan 2019
#
storage
#
converged infrastructure
#
personal computing devices
Once niche, NVMe technology is set to revolutionise enterprise storage in 2019 with faster, parallel communication, boosting efficiency and revenue.
Story image
Two top execs’ predictions for cybersecurity in 2019
Tue, 1st Jan 2019
#
malware
#
ransomware
#
biometrics
One Identity and Secureworks executives Alex Tilley and Serkan Cetin have released what they see coming for cybersecurity in 2019.
Story image
Hands-on review: The Logitech R500 laser presentation remote
Mon, 17th Dec 2018
#
gaming
#
digital transformation
#
digital entertainment
The Logitech R500, priced at USD $69, offers effortless control of presentations with a 20m range. Compatible with multiple OS, it enhances delivery.
Story image
Noel Leeming slapped with $200,000 fine for misrepresentation
Mon, 17th Dec 2018
#
personal computing devices
#
commerce commission
#
noel leeming
Noel Leeming has been fined NZD $200,000 for misleading consumers about their rights under the Consumer Guarantees Act, according to the Commerce Commission.
Story image
Take productivity to the next level with Surface
Fri, 14th Dec 2018
#
personal computing devices
#
microsoft
#
tablets & laptops
Microsoft’s latest-generation Surface devices unlock more power, performance and value for business customers.
Story image
Hands-on review: Quick and easy authentication with YubiKeys
Wed, 12th Dec 2018
#
gaming
#
mfa
#
digital entertainment
Consumers tend to believe that setting up two-factor authentication puts them at the height of cybersecurity best practice – but this belief is misled.