Feeds

Nikon updates Coolpix range-topper

Tasty

Internet Security Threat Report 2014

Nikon has introduced a new top-of-the-range Coolpix compact camera, this one coming in above the previous line leader, the P6000.

No surprise that it's called the P7000, then.

Nikon Coolpix P7000

Nikon is doing a Canon here. Canon's premium PowerShot G11 had a lower megapixel count than its predecessor, the better to reduce picture noise and in the realisation that 10Mp or so is sufficient. Likewise, the P7000 has a 10.1Mp sensor - less than the P6000's 13.5Mp. Both cameras have the same size of CCD: 1/1.7in.

The P7000 has a 7.1x optical zoom - the P6000 runs to 4x - and a 3in, 921,000-dot LCD. It can do 720p HD video recording, storing pics and movies on its 79MB of on-board storage or installed SDXC memory card.

It's also less bulky than its predecessor - there's no bulge/grip on the right-hand side - but it's heavier: 310g to 240g, thanks to a bigger battery that's good for 350 shots. The P6000 could take 260 shots on a full battery.

Nikon Coolpix P7000

There's no word on pricing or a release date. You check up on the P7000's full spec here. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.