Feeds
65%
Wacom Cintiq 21ux

Wacom Cintiq 21UX interactive pen display

Designer on-screen drawing tablet

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Review Wacom may be best known for its standalone, pressure-sensitive tablets, but its current flagship product is a 21-inch LCD monitor, but with a difference. The whole screen of the Cintiq 21UX is one enormous graphics tablet that you can draw on directly.

Wacom Cintiq 21ux

Drawing board: Wacom's Cintiq 21UX

In essence, the Cintiq 21UX eliminates the need to master a tablet as a separate piece of kit – where you would look in one place while drawing in another ¬¬– enabling you to work on an image without anything getting in your way. Curiously, the screen has a 4:3 aspect ratio, rather than widescreen, which initially feels like a backward step. After years of widescreen displays, I have to admit I found this display areas uncomfortably narrow.

The tablet comes with a sturdy multi-position mount. You can place it at any angle from virtually vertical to almost flat and rotate the screen to any position. The Cintiq’s versatile positioning helps to address the main problem with drawing directly on-screen, namely, the artist's hand obscures the image. By contrast, with a conventional tablet to the side of the monitor, it's possible always to see the entire image without impediment.

Raising the Cintiq 21UX up on a stand also means a keyboard can be placed beneath and in front of it, giving access to all the shortcuts and modifier keys essential for designers. This was a major problem with earlier Cintiq devices, and again it has been neatly overcome. It's also just about possible to remove the tablet from the stand and hold it in a lap, although it’s such a heavy device that few would find this comfortable for long.

Wacom Cintiq 21ux

Can be positioned to suit most drawing preferences

Eight Express keys on either side of the tablet’s edge can be customised to perform any function you choose, from triggering Photoshop Actions to holding modifier keys. Modifiers are essential to in applications such as Photoshop; to constrain selections, pop up contextual menus and to modify tool behaviour. Having these located on the tablet border is a good idea in principle, but there are a couple of problems.

Beginner's guide to SSL certificates

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD TO DIE, and this is WHY
Apple, er, couldn’t get parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.