Feeds

Dear Santa...

  • alert
  • submit to reddit

High performance access to file storage

Competition Dear Santa, I have been very good this year, and did not once remark upon Auntie Flo's unfortunate affliction. For Christmas, then, I would like a...

Well, what hardware would you ask the jolly red gent to leave under your tree this Yule? Drop us a line listing the three gadget goodies you'd most like Santa to bring and tell us why.

Update This competition is now closed.

Whether they're items you can buy today or kit that could be made by Santa's Elves a few years down the line, we want to hear about the most mouth-watering hardware and read most exciting reasons why they should top the want-list of any self-respecting technology nut. Extra points will be awarded for back-of-an-envelope sketches, diagrams etc.

Entries should be emailed with the subject line 'Reg Hardware Dear Santa Compo'. The closing date is Friday, 15 December, with a cut-off time of 11.59pm GMT. You must include your name and postal address, and send your entry from a valid email address.

Every day during the following week we'll pick out and publish the five best entries. We can't promise to send the winners the device of their dreams, but we can guarantee a stylish Reg T-shirt and maybe a little something for their Christmas stockings. ®

ho, ho, ho

Terms and Conditions
The Reg Hardware Dear Santa Competition is open to all readers of Register Hardware, one entry per reader. No purchase necessary. Multiple or incomplete entries will be disqualified, as will entries from readers' agents or other third parties. Entries must be accompanied by a valid email address. The winners will be announced online, but personal data, including email and postal addresses will not be made public. If the Editor judges there to have been too few entries of sufficient quality, he reserves the right to announce a reduced number of winners or to cancel the competition. The Editor's decision is final and no correspondence will be entered into. The Editor reserves the right to substitute any gift, prize or item with a gift, prize or item of equal value should any gift, prize or item prove unavailable due to circumstances beyond the Editor's control. Prizes will be mailed to the winners and may not arrive before Christmas.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.