Feeds

12 of the best... mice

Rodent wars

High performance access to file storage

Kensington SlimBlade Trackball

Kensington Slimblade Trackball

The first thing that will strike you about the SlimBlade is the enormous size of its ball - with a 55mm diameter it’s about the same size as a snooker ball and not far off the same weight. Being so big and heavy it 'rests on' rather the 'clips into' the base which, in itself, is on the large size – 150x135mm at its widest. The left and right click buttons are actually the two large areas behind the ball. With the Windows or Mac software installed, the forward left button activates Media mode while the forward right button puts it into Document View mode. A handy on-screen icon flashes up to let you know which mode the Slimblade is in. As the keen-eyed of you will have noticed, the SlimBlade lacks a scroll wheel. To scroll up and down pages you have to twist the trackball to the left or right, an operation made rather satisfying by a pleasant 'click' action. Not cheap at almost £100 but you do get a lot of mouse for your money.

Reg Rating 80%
Price £100 Click for the best online price
More Info Kensington

3M Ergonomic Mouse

3M Ergonomic Mouse

Though 3M's mouse may look like a joystick it isn't. You hold it like a good old fashioned gaming control but, to make it work, you have to push it around as you would a conventional mouse. This feels a little strange at first because you have to you use your arm rather than wrist, but that's the whole point. 3M has a specific aim in with this model; to prevent RSI and carpal tunnel syndrome in very heavy duty users. Left and right click buttons are replaced by controls on the top of the stick and next to the finger rest, which both fall naturally to hand after a short while. Available in both small/medium and large sizes, the 3M may not be a beauty but it’s a solid recommendation for anyone whose mouse usage goes beyond the usual domestic levels.

Reg Rating 85%
Price £60 Click for the best online price
More Info 3M

High performance access to file storage

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.