Feeds
90%

Canon Ixus 860 IS compact camera

Another hit from Canon?

Remote control for virtualized desktops

Review Behavioural scientists reckon that, within ten seconds of meeting someone for the first time, we’ve already decided whether we like them or not. Well, if the Canon Ixus 860 IS was a person, we would have liked them from the moment we first clapped eyes on them.

It’s a handsome thing, with smooth curves, a two-tone silver and black finish, and feels reassuringly solid in the hand. The rear of the camera is dominated by a large, 3in LCD screen composed of 230,000 pixels. Images displayed on the screen are sharp and clearly defined. On top of the body is a small slider button for selecting camera, scene or movie modes, a tiny power button and a zoom rocker control.

Canon Ixus 860 IS digital camera
Canon's Ixus 860 IS: sexy beast

Around the back is the ubiquitous multi-function controller, along with buttons for playback, direct printing, menu selection and display mode. Hidden behind a (rather flimsy) plastic flap is a mini USB port and an AV socket, while underneath the camera is another flap, this time concealing the battery and SD card slots.

You get the usual assortment of accessories - connecting leads, battery charger, and PDF manual and software on a CD. Canon also throws in an SD card as the Ixus 860 has no internal memory. With memory prices so low these days, it was disappointing to find Canon providing a measly 32MB card, which will record just eight images at the highest resolution or 14 seconds of moving pictures.

Canon Ixus 860 IS digital camera
The LCD's nice and big

When it comes to features, the 860 IS offers quite a lot. There’s an eight-megapixel CCD fed through a 3.8x optical zoom lens equivalent to 28-105mm on a 35mm camera, allowing users to pull in extra detail from the side. You also get a 4x digital zoom; shutter speeds from 15s to 1/1600 of a second; ISO ratings from 80 to 1600; a variety of shooting modes, including auto, manual (although not manual exposure), Stitch Assist, and scenes such as Night, Kids and Pets, Snow, Beach and Underwater. Of course, the last one of those should probably only be used in addition to the optional underwater protective cover...

Internet Security Threat Report 2014

More from The Register

next story
Nexus 7 fandroids tell of salty taste after sucking on Google's Lollipop
Web giant looking into why version 5.0 of Android is crippling older slabs
Heyyy! NICE e-bracelet you've got there ... SHAME if someone were to SUBPOENA it
Court pops open cans of worms and whup-ass in Fitbit case
SLURP! Flick your TONGUE around our LOLLIPOP – Google
Android 5 is coming – IF you're lucky enough to have the right gadget
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.