Wednesday, 6 Jan 2016
Gigabyte's unveiled their newest notebooks at CES 2016, from hardcore gaming machines to more mainstream ones. There's something for everybody!
Tuesday, 5 Jan 2016
The MSI GT72 Dominator Pro Tobii will be the first consumer gaming notebook with integrated eye tracking hardware technology, brought to you in conjunction by none other than Tobii, the leader in eye-tracking technology. Find out more about how it can improve gaming experiences.
Lenovo is capitalizing on the growing PC gaming market with a slew of new gaming machines, all of which are crammed with features to appeal to the most discerning gamers. What's more, it unveiled a Razer Edition desktop and curved gaming monitor, the result of a strategic partnership with Razer.
Thursday, 17 Dec 2015
LG has teased the LG gram 15, an ultra-light 15.6-inch laptop in the body of a 14-inch notebook, ahead of CES 2016. Believe it or not, it is really lighter than the 11-inch MacBook Air!
Bloomberg reports that Apple opened a secret laboratory in northern Taiwan to develop new display technologies for use in the iPhone, iPad and Mac.
Thursday, 10 Dec 2015
AMD just announced a couple of major updates to its FreeSync variable refresh rate technology to make it accessible to an even wider swathe of the market. How does FreeSync over HDMI sound?
Tuesday, 8 Dec 2015
ASUS' new service center will provide servicing for a wide variety of its "finished products" such as notebooks, smartphones and more at its new and convenient location at Stamford Road.
Tuesday, 1 Dec 2015
Economic Daily News reports that Apple will be giving the MacBook Air a major overhaul in mid-2016. Read on to find out about the specs of the upcoming MacBook Air.
Wednesday, 25 Nov 2015
Dell has acknowledged that its eDellRoot certificate poses significant security concerns. Instructions on how to remove it are online and a software update is also on the way.
Tuesday, 24 Nov 2015
Reports have emerged that many Dell computers shipped after August have easily cloneable root certificates that could let hackers snoop on a machine's encrypted Internet traffic.