Feeds

Best Buys: Budget DSLR Cameras

Mirror, mirror...

Internet Security Threat Report 2014

ISO Tests

Canon 1000D  Canon 1000D

Canon EOS 1000D: ISO 200 (left) ISO 1600 (right)
Click for a full-resolution crop

Nikon D3000  Nikon D3000

Nikon D3000: ISO 200 (left) ISO 1600 (right)
Click for a full-resolution crop

Olympus E-450  Olympus E-450

Olympus E-450: ISO 200 (left) ISO 1600 (right)
Click for a full-resolution crop

Pentax K-x  Pentax K-x

Pentax K-x: ISO 200 (left) ISO 1600 (right)
Click for a full-resolution crop

Sony A290  Sony A290

Sony Alpha A290: ISO 200 (left) ISO 1600 (right)
Click for a full-resolution crop

Remote control for virtualized desktops

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.