Feeds

Reg Hardware competition winners

The lucky ones

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

iPad Case Giveaway Winners

All the following folk entered and won our recent Mass iPad Case GIveaway - your cases and Reg goodie bags are on their way to you:

Jimmy Aitken, Chris Biddle, Tom Bray, Sue Brett, Julie Bristow, Andrew Burrows, Jo Byworth, Chris Danks, Caroline Davison, Chris Eagles, James Fordham, Adam Fyfe, Ian Gardiner, Sue Gregson, James Hair, Stephen Hollis, Steve Hopkins, Andrew Hunt, Richard Jenner, Pauline Jepson, Steve Kersley, Adam Lee, Neil Lewis, Will Lovett, Graeme Lythgoe, Olivia McCourt, Fearghas McKay, Max Pathan, Chris Pollard, Laura Pritchard, Jason Ratcliffe, Jon Sandys, Karen Sargent, Chris Smith, James Stacey, Laura Sterling, David Stewart, Andrew Stirling and Tim Turner.

While we're here, the following people also came up winners in Reg Hardware Giveaways and Competition during the past months:

  • Sam Banerjee - a Synology DS411+ Nas drive and WD 2TB Caviar Green hard drive
  • Andy Billany - an Apple 64GB iPad 3G+Wi-Fi courtesy of eXpansys.com
  • John Brookes - a pair of Sony MDR-EX300SL earphones
  • Adrian Hamer - an Altec Lansing inMotion Compact
  • Anne-Marie Kavanagh and Mike Polak both got Plantronics Explorer 240 Bluetooth headsets
  • Neil Shenton - a Play Max wireless router from Belkin
  • Nick Smith - from Plantronics, an .Audio 646 headset

Congratulations to all these readers. There are plenty more opportunities to win coming in the New Year. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.