Feeds

12 of the best... mice

Rodent wars

High performance access to file storage

Targus Rechargeable Wireless Mouse With 3-port USB Hub

Targus Wireless Mouse with 3-port USB Hub

You don't have to listen to too many MacBook Air users moan about their paltry, single USB port to see where Targus are coming from with its combined mouse and USB hub. Rather than labour the problem, Targus has opted for simplicity. This basic but perfectly serviceable mouse connects wirelessly to the USB hub, which, in turn, plugs into the USB port of the computer. To charge the removable AA battery while in use, simply hook up the mouse to the hub using the second USB cable Targus thoughtfully provides. When not in use the USB hub and mouse slot together to form one easily pocketable item. Not rocket science, but still a well thought out device that should find more customers as slimline laptops with fewer USB ports become more common.

Reg Rating 85%
Price £25 Click for the best online price
More Info Targus

Raptor Gaming M3 Platinum

Raptor M3 Platinum Mouse

Ah, gaming mice. We've never been wholly convinced that mice optimised for gaming have to be quite so highly specified, but if needs must, then the Raptor M3 is one of the best. With four variable DPI laser settings, weight adjustment between 110g and 155g, six separate exit channels for the USB cable to connect to, plus programmable function buttons, and the M3 is already in a different class. Add to that, the detachable wrist wrest and weight cubby hole covers that can be swapped over to change the size of the contact patch between mouse and mat, plus two nylon cases – one for the mouse and one for the weights. Certainly, you get a lot for your money. The matt body is a nice touch – even after long and sweaty nights on the front lines against the Covenant or the Helghast – it stays firmly in your grip as you leap into the mêlée and generally endure. Not the easiest bit of kit to get hold of in the UK, but worth the effort just so you can say your mouse is called a Raptor.

Reg Rating 90%
Price £75
More Info Raptor

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.