Feeds

Readers win with Reg Hardware

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Every day this week, Register Hardware is offering readers the chance to win a Nokia E65 smart phone, and we've drawn our first winners...

So will you please give a big hand to Philip Taylor and Sanjit Sousa who will both be shortly taking possession of brand spanking new E65s. Congratulations, guys.

Don't forget, there's still time to enter today's draw, and you'll have two further opportunities to win on Thursday and Friday. To try to win an E65, just fill in the form on the Reg Hardware Nokia E65 Competion page, here.

We'd also like to offer our congratulations to Mark French, Tony Marvin, John Brittan, Roger Moore, Julie Reed, David Phillips, Richard Talbot, Ashley Smith, Guy Collier, Stephen Lee, Phil Leung, Mark Webb, Andrew Tolley, Pierre Coulombe, Mark Wan, Ben Morgan, Rahul, Chris Tweed, Lee Prescott and Daniel Lawrence, all of whom entered our recent Logic3 i-Station Traveller competition and won iPod speaker sets.

Mark Rayson, Mrs Caddell, James Burns, Chris Twamley, Joseph Ewen, Jon Leighton, Philip Greathead, Klaus S Madsen, Chris Folkerd and Stewart Mackintosh were the runners-up and all win snazzy Reg Hardware T-shirts.

Remote control for virtualized desktops

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.