101 Stories
Ubuntu may be the most well-known of the Linux distributions, but that doesn't mean much, and it certainly wasn't enough for the operating system to reach founder Mark Shuttleworth's ambitious goal of...
There's been some serious speculation in recent years that the console market is done for, at least in the form that we're used to seeing. It's easy to see why...
Microsoft has had a lot to say about Windows 10, but actions speak louder than words, and the picture that the company has painted for us is a lot nicer...
Windows Insiders have had access to Windows 10 Mobile for a while now, but unless they've purchased a Lumia 959 or Lumia 950 XL, most Windows Phone loyalists haven't been...
It's easy to forget that Halo isn't the most popular game that Microsoft publishes. The company's most popular games are actually the casual ones that come bundled with Windows, like...
The rumor that Pepsi was working on its own smartphone was one of the strangest bits of news the tech world has seen this year, bu last month, the company...
Zune hasn't been a thing for years, but then again, it was never really a thing to begin with. Microsoft's music service has been rebranded twice, first to Xbox Music...
The PlayStation 4 has definitely been winning this generation's console war, mostly due to how Microsoft handled the Xbox One's launch, but now it looks like the Xbox One is starting...
If there's one thing that Windows Phone has over Android and iOS, and it's probably the only things, it's security. Steve Lord, who has worked as a hacker and security...
Windows 10 has a nice design on the surface, but once you start using it, there are a number of poor design choices and a ridiculous amount of inconsistency in the...
Tor has been described by the NSA as the undisputed king of online anonymity, and it's an essential tool for Internet users who want to protect themselves from prying eyes. The Tor...
Ransomware, for those of you who aren't familiar, is a popular way for hackers to extort money from Internet users by encrypting important information on their computer and demanding that...
Page 2 of 9