Feeds

Readers win with Reg Hardware

  • alert
  • submit to reddit

Remote control for virtualized desktops

Every day this week, Register Hardware is offering readers the chance to win a Nokia E65 smart phone, and we've drawn our first winners...

So will you please give a big hand to Philip Taylor and Sanjit Sousa who will both be shortly taking possession of brand spanking new E65s. Congratulations, guys.

Don't forget, there's still time to enter today's draw, and you'll have two further opportunities to win on Thursday and Friday. To try to win an E65, just fill in the form on the Reg Hardware Nokia E65 Competion page, here.

We'd also like to offer our congratulations to Mark French, Tony Marvin, John Brittan, Roger Moore, Julie Reed, David Phillips, Richard Talbot, Ashley Smith, Guy Collier, Stephen Lee, Phil Leung, Mark Webb, Andrew Tolley, Pierre Coulombe, Mark Wan, Ben Morgan, Rahul, Chris Tweed, Lee Prescott and Daniel Lawrence, all of whom entered our recent Logic3 i-Station Traveller competition and won iPod speaker sets.

Mark Rayson, Mrs Caddell, James Burns, Chris Twamley, Joseph Ewen, Jon Leighton, Philip Greathead, Klaus S Madsen, Chris Folkerd and Stewart Mackintosh were the runners-up and all win snazzy Reg Hardware T-shirts.

Intelligent flash storage arrays

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.