Feeds

Reg Hardware Reviews Digest

Another chance to see our reviews from the last week

  • alert
  • submit to reddit

Internet Security Threat Report 2014

In the past seven days, Reg Hardware reviewed many products from the worlds of consumer electronics, photography, gaming, mobile communications and information technology.

If you missed anything, here are all the products we looked at this past week.

Lifestyle

Samsung UE46C8000 3D TV
Picture perfect?

Withings Wi-Fi bathroom scales
I tweet your weight

Sony Walkman NWZ-A845 media player
Thinnest Walkman yet

Pioneer BDP-330 Blu-ray player
Pure and simple

Computing

Lite-on iHBS112 internal Blu-ray writer
Cheap and fast - cheerful too?

Acer Aspire Ethos 8943G 18.4in laptop
Full HD desktop replacement with plenty of poke

Mobile

Motorola Milestone XT720
First xenon flash Android camphone

Samsung Galaxy S Android smartphone
The Android iPhone clone that has it all?

Alcatel OT-808 fashion phone
Qwerty clamshell with text appeal

Photo

Polaroid 300 instant print camera
Fun retro-snapper revived

Gaming

Limbo
Left in the shade

3D Dot Game Heroes
The closest you’ll get to Zelda without dusting off your NES?

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.