|
|  | Leaked Windows 10 build brings Google Calendar support back to Windows 04.06.2015 6:59 AM Microsoft removed Google Calendar support from Windows 8.1's Calendar app over a standards battle with Google, but it's back in the leaked Windows 10 preview build 10051. | |
|
|  | New camera chip could turn phones into 3D scanners 04.06.2015 5:17 AM Scaling up the Caltech device could make it useful for applications such as driverless cars. | |
|
|  | Galaxy S6 Edge review: Samsung's vanity phone 04.06.2015 4:00 AM This is one of Samsung's most beautiful products, but it may not be worth the extra Benjamin it costs to bring home. | |
|
|  | Samsung rebuts tester's claim that Galaxy Edge S6 bends easily 04.06.2015 10:35 AM The phone maker thinks a stress test applied too much pressure | |
|
|  | How to install two or more operating systems on one PC 04.06.2015 7:52 AM Sure, you can run Windows and Linux, or two versions of Windows, all on the same PC. Just follow these steps to do it right. | |
|
|  | Acer's Revo One RL85 desktop comes to US with Broadwell chips 04.06.2015 9:35 AM The new PC combines beauty and brawn, and starts at $249.99 | |
|
|  | Reviewed: Falcon Northwest Mach V with triple Titan X cards rips the lid off our gaming tests 04.06.2015 3:00 AM Nvidia's GeForce Titan X has already been anointed the king of gaming GPUs. Packing three into the Mach V has made it one of the fastest gaming rigs in the world. | |
|
|  | 5 ways to use Note Links, Evernote's secret weapon for getting organized 04.06.2015 3:30 AM This powerful organizing tool links related items in Evernote, turning your virtual data dump into neat digital file stacks. | |
|
|  | Expired Google certificate temporarily disrupts Gmail service 04.06.2015 5:11 AM Google let a certificate linked to the Gmail SMTP server expire, causing issues for third-party email clients | |
|
|  | Vulnerable Dell support tool now detected and flagged as risky software 04.06.2015 7:18 AM Older versions of Dell System Detect contain a serious vulnerability that allows hackers to install malware on users' computers. | |
|
|
No comments:
Post a Comment