Feeds

Final call for Reg Hardware Reader Awards 2010

Vote now - and see if you'll win an Xbox

  • alert
  • submit to reddit

The Power of One Infographic

Back in November we asked you to make your suggestions for the products most worthy of a Reg Hardware Readers Award. We got hundreds of nominations from which we drew up shortlists of the most popular - and least popular in the case of the Rusty Dodo Award - gadgets released in 2010.

And now, ladies and gentlemen, it's your last chance to vote on which of these should win the gongs. Voting closes on Friday on 14 January and we will publish the results and the name of our prize draw winner on 21 January.

At the same time, we'll announce our Reg Hardware Editor's Choice Awards for the best Computer, Lifestyle, Photo, Mobile and Games products of 2010.

So head on over to the Reg Hardware Reader Awards 2010 site and make your voice heard.

We'll automatically enter you into our prize draw. Up for grabs: an Xbox 360 supplied by Xbox Live - and we'll chuck in a stack of the most recent top-name titles of 2010 too.

Voting is easy: just put a tick by the product you want to pick in a given category. Doddle.

To refresh your memory, the categories are:

  • Home Product of the Year
  • Work Product of the Year
  • Commuter Product of the Year
  • App of the Year
  • PC Game of the Year
  • Console Game of the Year
  • Best Tech Retailer
  • Best Service Provider
  • Rusty Dodo Duff Product of the Year

®

Click Here to Vote Now

Terms and Conditions

Voting in the Reg Hardware Reader Awards 2010 is open to all readers of Reg Hardware and The Register aged 18 or over. No purchase is necessary to vote.

Voting is not open to employees of Situation Publishing Ltd, their families, or agents, or of any companies and its product(s) named in the ballot. Only one entry is permitted per reader. Multiple entries will be disqualified. Disproportionate voting for a given products will render that product ineligible for an award.

The draw prize is subject to availability and if, due to circumstances beyond Reg Hardware's control, we are unable to provide the stated prize, or part of it, an alternative prize or part of equivalent value will be supplied. Reg Hardware will not be liable if the prize or part of the prize does not reach the winner for reasons beyond our control, or if the prize is damaged during delivery. Parts of the prize may be sent separately.

Each entrant must supply a valid email address to which a confirmation email will be sent should the entrant's name be drawn. The winner will be the first name drawn from entrants who have correctly answered the questions posed. Winners will be notified by email within 28 days of the closing date, and must respond within one week. Winners who do not respond within this time may be disqualified and another winner drawn in their place. The Editor's decision is final, and no correspondence will be entered into. Closing date: Midnight, Friday 14 January 2011.

By entering the competition you agree to have your supplied personal details passed to the sponsor so that they can contact you with further information about their company, products and services.

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.