Feeds

Ten... pocket compact cameras

When a phonecam just won't do

Choosing a cloud hosting partner with confidence

Sample Shots

Wide-angle sample from all cameras here (40MB zip) and tele-photo here (43.2MB zip).

Canon Ixus 115 HS

Canon Ixus 115 HS
Click for full-resolution image

Casio Exilim EX-Zs10

Casio Exilim EX-Zs10
Click for full-resolution image

 Kodak EasyShare M200

Kodak EasyShare M200
Click for full-resolution image

Fujifilm FinePix Z90

Fujifilm FinePix Z90
Click for full-resolution image

Nikon Coolpix S2500

Nikon Coolpix S2500
Click for full-resolution image

Olympus VG-130

Olympus VG-130
Click for full-resolution image

Panasonic DMC-FS18

Panasonic DMC-FS18
Click for full-resolution image

Pentax Optio S1

Pentax Optio S1
Click for full-resolution image

Samsung ST30

Samsung ST30
Click for full-resolution image

Sony DSC-W360

Sony DSC-W360
Click for full-resolution image

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.