Some folks still say that the x86 ISA will never catch up to ARM when it comes to efficiency. Our granular power analysis demonstrates just how efficient x86-based CPUs can be, though. But how does Intel compete when we dig deeper into user experience?
Intel recently shared very granular power measurements of its Atom SoC and Nvidia's Tegra 3. If you previously believed ARM's architecture to be inherently more efficient, perhaps you underestimated the benefit of Intel's manufacturing and architecture.
Apple's third-generation iPad hit the market last week, and we're impressed. Sporting a new 9.7" Retina display, the iPad 3 sports the most gorgeous display that we've seen on a tablet. Join us for the first part of our iPad 3 coverage.
Apparently, HP's preferred course of action is spinning its Personal Systems Group off into its own entity. But that's not necessarily what will happen. Would our world as enthusiasts change if HP ended up selling its PC business? Chris and Alan discuss.
What would an operating system look like it if were redesigned with security in mind? Joanna Rutkowska thinks she has the answer with the development of Qubes OS. We sit down for an interview with Joanna to discuss the way Qubes OS augments security.
Accuvant Labs' Charlie Miller talks to Tom's Hardware about the Defender's Dilemma, the security of data in the cloud, looking for vulnerabilities in notebook batteries, and the ramifications of using Apple's iPad in an enterprise environment.
Regular Tom's Hardware readers know Charlie Miller as the first person to hack Apple's iPhone and a repeat winner of CanSecWest's Pwn2Own contest. This time around, we talk to Charlie about jailbreaking and what it means to smartphone security in general.
What makes Chromium, the core of Google Chrome, the most secure Web browser on the Net? We chat with two former Google employees who helped to develop the sandbox model of Chromium.
We sat down with Dino A. Dai Zovi, a security researcher focused on offensive security and former member of the Sandia National Laboratories' Information Design Assurance Red Team (the guys who test the security of national agencies). Check it out.
You’ve probably seen the headlines: “Pwn2Own 2008: MacBook Air hacked in 2 minutes” or “Pwn2Own 2009: Safari/MacBook falls in seconds.” But there’s a story behind every headline and who better to get it from than Charlie Miller, the man behind the buzz.
Long-time PC power user turned Apple convert Alan Dang shares his thoughts on Apple's MacBook in this, the first of a two-part review of the hardware and operating environment.
Where were we in 2008 and where are we heading in 2009? In his State of the Personal Computer address, Alan Dang shares his insights as a user of three different platforms: Mac, Windows, and Linux.
Current page: 1