Feeds

Ten... wireless keyboards

Finger clicking good

  • alert
  • submit to reddit

High performance access to file storage

Fujitsu LX900

RH Numbers

The Fujitsu LX900 has all the features you'd associate with a higher-end keyboard. But other than 128-bit AES encryption and spill resistance, it doesn't exactly rock my boat. It just looks too square and has a fairly inexpensive appearance. To be fair though, it's an all-round decent keyboard and was one of the quieter models to tap away on. It's sponginess felt great and typing was better than my first impressions led me to believe it would be.

The hotkeys run along the top in the form of strip membrane buttons, which feels a bit tacky. There is a battery indicator though and it comes with a dinky dongle and decent mouse. Its rubber coated base feels lovely too, and while in deep thought between sentences, makes a great alternative to stroking one's chin hair.

Fujitsu LX900

Reg Rating 80%
Price £50
More info Fujitsu

HP Wireless Elite

RH Numbers

HP's Wireless Elite is a fairly smart-looking, full-length keyboard, with a matt finish and compact feel. It's very light, ultra thin and sits nicely on my desk without taking up huge amounts of room. The F keys double up as the hotkeys, but there's separate volume and mute buttons and although no indicator for battery life on the device itself, warnings do appear on-screen. When typing, the feel is definitely above average, with fairly flat nicely-shaped keys and the action isn't so plaquey. The keyboard is splashproof too and comes at a reasonable price.

The huge downside to this one though is the moderately large dongle. The annoying aspect is not the size, but rather a completely unnecessary blue LED, which lights up every time you hit a key. If it was tucked behind a desktop out of sight, it wouldn't make a difference, but in the line of sight, it's distracting and for all its plus points as keyboard, you soon grow weary of the blinking thing.

HP Wireless Elite

Reg Rating 85%
Price £50
More info HP

High performance access to file storage

Next page: Kensington Pro Fit

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.