Feeds

Reg Hardware Reader Awards 2010

Vote now - and see if you'll win an Xbox

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Reg Hardware Reader Awards 2010 Back in November we asked you to make your suggestions for the products most worthy of a Reg Hardware Readers Award. We got hundreds of nominations from which we drew up shortlists of the most popular - and least popular in the case of the Rusty Dodo Award - gadgets released this year.

And now, ladies and gentlemen, it's time to vote on which of these should win the gongs.

So head on over to the Reg Hardware Reader Awards 2010 site and make your voice heard.

And, while you're about it, we'll automatically enter you into our prize draw. Up for grabs: an Xbox 360 supplied by Xbox Live - and we'll chuck in a stack of the most recent top-name titles of 2010 too.

Voting is easy: just put a tick by the product you want to pick in a given category. Doddle.

To refresh your memory, the categories are:

  • Home Product of the Year
  • Work Product of the Year
  • Commuter Product of the Year
  • App of the Year
  • PC Game of the Year
  • Console Game of the Year
  • Best Tech Retailer
  • Best Service Provider
  • Rusty Dodo Duff Product of the Year

We'll be announcing the Awards winners early next month right after the Consumer Electronics Show (CES), from which we'll be bringing you details of many of the gadgets and gizmos likely to feature in next year's awards.

At the same time, we'll announce our Reg Hardware Editor's Choice Awards for the best Computer, Lifestyle, Photo, Mobile and Games products of 2010. ®

Click Here to Vote Now

Terms and Conditions

Voting in the Reg Hardware Reader Awards 2010 is open to all readers of Reg Hardware and The Register aged 18 or over. No purchase is necessary to vote.

Voting is not open to employees of Situation Publishing Ltd, their families, or agents, or of any companies and its product(s) named in the ballot. Only one entry is permitted per reader. Multiple entries will be disqualified. Disproportionate voting for a given products will render that product ineligible for an award.

The draw prize is subject to availability and if, due to circumstances beyond Reg Hardware's control, we are unable to provide the stated prize, or part of it, an alternative prize or part of equivalent value will be supplied. Reg Hardware will not be liable if the prize or part of the prize does not reach the winner for reasons beyond our control, or if the prize is damaged during delivery. Parts of the prize may be sent separately.

Each entrant must supply a valid email address to which a confirmation email will be sent should the entrant's name be drawn. The winner will be the first name drawn from entrants who have correctly answered the questions posed. Winners will be notified by email within 28 days of the closing date, and must respond within one week. Winners who do not respond within this time may be disqualified and another winner drawn in their place. The Editor's decision is final, and no correspondence will be entered into. Closing date: Midnight, Sunday 9 January 2011.

By entering the competition you agree to have your supplied personal details passed to the sponsor so that they can contact you with further information about their company, products and services.

Remote control for virtualized desktops

More from The Register

next story
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?