Feeds

It's like The Register - only harder

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Welcome to Reg Hardware, the new website devoted to everything from computers to communicators, gadgets to games consoles.

Every day we'll be focusing on the best gadgets, components, peripherals and systems for today's tech-savvy enthusiasts and consumers. Our extensive up-to-the-minute news coverage will be backed by product reviews, round-ups, head-to-heads and buyers' guides, as we follow new, ground-breaking solutions from the lab to the living room...

Reg Hardware will continue to feature the authoritative, 'take no prisoners' journalism pioneered by The Register, yet we've adopted a easy-to-read blog-style homepage to make accessing the latest news and product reviews even more convenient, along with a bright new design that speaks to the mainstream consumer yet is one in which the tech-savvy will feel right at home.

We hope you like it - let us know what you think, and what you'd like Reg Hardware to cover.

Reg Hardware - just like The Register, only harder. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.