Feeds

Reg Hardware Reader Awards 2010

Have YOUR say

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Reg Hardware Awards 2010 marks the launch of the Reg Hardware Awards - and we need YOUR help.

We've looked a lot of kit this year, and we know what we think is the best of the bunch - there will be a handful of Editor Awards too, see below - but we want the majority our awards to reflect what you, the reader who buys and uses the gadgets, computers, games and apps we review, thinks about them.

Reg Hardware Awards

So we're looking for your suggestions for our shortlists for the following Reg Hardware Reader Awards:

Reg Hardware Awards

Reg Hardware Editor Awards

  • Computing Product of the Year
  • Lifestyle Product of the Year
  • Photography Product of the Year
  • Mobile Product of the Year
  • Games Product of the Year

You have until midnight on Tuesday, 30 November to make your nominations using the Reg Hardware forums - just click on the links above to go straight there and make a suggestion.

We'll then collate all your suggestions and draw up shorlists from which you'll be able to cast your vote early next month. ®

Remote control for virtualized desktops

More from The Register

next story
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.