Feeds

Reader Top 10s: an experiment in crowd pleasing

Try out our new voting system. Please

  • alert
  • submit to reddit

Security for virtualized datacentres

Site news In recent weeks, reghardware has run a series of top 10s - rounds up of "essential" or "best" apps and peripherals.

And very popular they have proved too, especially this one: Ten free apps to install on every new PC.

This prompted 187 comments, with readers in their dozens suggesting dozens more apps - and slating us for including iTunes for Windows on our list.

One commenter wrote to us to suggest that we put reader recommendations to the vote. This got us thinking and we came up with...a voting system.

Let's call it Voting Live Beta: it's clumsy - and we haven't figured out a good way yet to show the results. But then crowd-pleasing is very new to us.

Give Voting Live Beta twirl with the two articles below - and get sharing those recommendations. Also, please give us your feedback on the comments pages for this article - all suggestions for improvement most welcome.

Ten essential Android apps

reghardware has republished an article that went out on April 9. The original had a manageable number of comments for us to digest, but for boring reasons, we can't easily add voting on stories already published.

Top 10 iPhone games

Casuals or casualties? You the jury decides...maybe...

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.